33e15abf03c3205731f49f2bfad29f3", 0xf8}, {&(0x7f0000004800)="4a0b48212872b301b75a9fe9477f868f6a1449f8305203b5c6ff406a67e0139cd5cda8f6b5d600f750589da909fd7aa20c854360ea03a7150c016bfca6ab57585abec5f9f080812f4a1aaf41b26c", 0x4e}], 0x3}}, {{&(0x7f0000004880)={0xa, 0x4e24, 0x8, @mcast2}, 0x1c, &(0x7f0000004ac0)=[{&(0x7f00000048c0)="b878113bfdde72161c30b423993d9d15a0c996216ea8155367b96894e56c6a7084080c1e5212aaec364be6feb247f6def8e2216463e11affae205c7cede0a107b04ee5cbd9cbb6d27f2b008b67a627c40743c27d9adda96e2cdba5ff1ce468436730523ab2d57ec520b610310941faedb56181ce92fc136d21b5e0ae744cf3ed36e9c336bc0b1293f49ada85", 0x8c}, {&(0x7f0000004980)="5f89f8fa3f212f66ebc50deb26c44654ed3e03ef057ef5bda6824d55b6b925ce1f7c02a4affe31199fdeede0af11deba87456f2ecc0924dc31a2eb431fb6fb3cd259bff9a3f80de7f02e6418728d2e8647f804b2aa6fffba715d30e173c83634d8649bc441eafbbc3d6bc8c124af520ab8d6c87aa1ee57df3233ed", 0x7b}, {&(0x7f0000004a00)="186fe0351138586e73551f8d994c3779127f1a1ba69de1ee890d6c59f91913c79c85735fe99da059420ad9acc3b436017b677c1a44a2faa74bd478444f2d03287f9b9880ffb247fc4b3a8dcd1a525d0563ded9d1b754f7eea96f4eeca1d575f2a40ed56e35e405cbb4ac663a3173448be96a79", 0x73}, {&(0x7f0000004a80)="ad5f6ecf6fd47a7850aaa0a60e7113", 0xf}], 0x4, &(0x7f0000004b00)=[@hoplimit={{0x14, 0x29, 0x34, 0x5}}, @dstopts={{0x28, 0x29, 0x37, {0x3b, 0x1, [], [@jumbo={0xc2, 0x4, 0xc00000}, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}, @flowinfo={{0x14, 0x29, 0xb, 0xe6}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x5c, 0x4, 0x0, 0x3ae, 0x0, [@ipv4={[], [], @rand_addr=0x1}, @remote]}}}], 0xa8}}, {{&(0x7f0000004bc0)={0xa, 0x4e21, 0x8000, @empty, 0x7}, 0x1c, &(0x7f0000005f00)=[{&(0x7f0000004c00)="c35fd3629df5c0a73b2a94f1a9e7d91cf6632b327a43cdd6dd0b1cdfa40e6d9cc7ba0c5637f2cf08bb7ffc29ef6fd88569d5017871d0c29a1f90976415262f27a709de943464c4b4b8de0cb71c06a3aa034de10baec114068f0e7ef2fa9606298100d90851b6abfd11c6b4450b5410913ab0266f6156be813dec9aa3787fa368d8c29f04fdd7075536bbe25c1593de7b53361875a1e2b2212f268c81c8635c9c2e738e7a6d7d8f31f765314ba7565d56de07349357036764939db3413843b8e359a3ed8ef5575e3617daa23c17ef9e7d8b8458f2e70409fe4db35828077a034f1db14d1c707bdeb204b521", 0xeb}, {&(0x7f0000004d00)="51526158ee30596155a5a7abdb48338cf8cb18e90633b33733f100189bfa80e0a97ff0425591091f43155ef44f631026ea7ecbf59545d25830ad85eee9d767e97d9b69d1dfe887dade1328727a39fb492fd22962e3e9689f34da0cacbe1eab0e2ae1d2170998069294a5278015408f80a268ebee489d491a8ad62b3f6089abd05e80cb6f57b93b84a3820385df2425416548eaa923", 0x95}, {&(0x7f0000004dc0)="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", 0x1000}, {&(0x7f0000005dc0)="dbea895808ae5aa1349a9276d1752b4958c3ba69be64f5", 0x17}, {&(0x7f0000005e00)="8f7bec96889bfad1d2de0b1753ed7f13a61ce28e40f98ef499da859fdfb8b433ca66020529eba1433a5b48b74ba38132126964864de7b6d13bf63bcaa22626e08f375eabf03c1c557c441012459e0e6b235ee5ac26e19a277546492501117649e89e02ad3e3aad6ba8b98425351da5b1cfc9df491575ad478abf66ff4c4bc80c8d6004b0e6e0aaaef8fb0538cce31c4720aaa9a070cd88aaa9ed294043e3", 0x9e}, {&(0x7f0000005ec0)="a6ca2124a1c1ac60be221638523fa8b7829bab0d5697eae8ca1eed458bc708b22e886db713984636ea54", 0x2a}], 0x6, &(0x7f0000005f80)=[@dstopts_2292={{0xb8, 0x29, 0x4, {0x2, 0x14, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra, @jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1, @generic={0x100000000, 0x84, "e538e864058fc0ebb6cd52531edc0f9e23820c19aaa6277e55b28720b9a86d2507aaf7036378eaf7db86045fe889539effec75e17cc81ff412cd65bd3dc6500691c56c1a4a9f31db96bb6156b94c14d7a3a569592b1f347f040a8fae48723ee170d00a9a67eb0baf31dd78232045a197b49deff31d59f5c8d7e19adc941e37c365530730"}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x88, 0x7, [], [@generic={0x20, 0x3b, "922c170607ba103144b8155d9da5d2da7da8c9ea0894eda1eb6046a120fc92f4639a8ea27de7d723039bacef0001d515f7cad7eb6172fee1ad2b4f"}]}}}, @dstopts={{0x100, 0x29, 0x37, {0x2f, 0x1c, [], [@calipso={0x7, 0x30, {0x1, 0xa, 0x10001, 0x6f0, [0x1000, 0x1, 0x5d, 0xffffffffffffffff, 0x1]}}, @jumbo={0xc2, 0x4, 0x40}, @pad1, @generic={0x6d3c, 0x84, "33295badb246b49d55e4e40ad65ade9c5f5d1d345d6f561ecedde71d8c5505cda1222d44e24f20705e6d96cd4d8dc6bee93d53f0e2d9d534986d592fe36048b68145b95f68a6b50b3d37df2ba04b7ed8c7c4f86cac68d2b00f608587fd74a6aa03b0572f38988e16c8430cd5ac99ef56cb7a756233feef78981d6d329fd23f4bdc2ddcf3"}, @enc_lim, @jumbo={0xc2, 0x4, 0xfa8}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0xb3}]}}}], 0x210}}, {{0x0, 0x0, &(0x7f0000006240)=[{&(0x7f00000061c0)="a400e78a6eb1c47fe13e1a4534b617c431fd251511f6d79e038354327842931af72416cad001e217ee6abc16c979b305c113c7e3bde01f702af16e0843d0d1dbb2917d28607f4a3c07e9c306a3", 0x4d}], 0x1, &(0x7f0000006280)=[@dstopts_2292={{0x68, 0x29, 0x4, {0x2e, 0x9, [], [@ra={0x5, 0x2, 0x3}, @calipso={0x7, 0x30, {0x8, 0xa, 0x100000001, 0x7, [0x1, 0x0, 0x0, 0x100000001, 0x7fffffff]}}, @pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x5}, @ra={0x5, 0x2, 0x4}, @enc_lim={0x4, 0x1, 0x5}]}}}, @hopopts={{0x110, 0x29, 0x36, {0xc, 0x1e, [], [@hao={0xc9, 0x10, @rand_addr="0e1dfc73e8efce171508d463966e06ca"}, @enc_lim={0x4, 0x1, 0x401}, @generic={0x2, 0xda, "d16f7ca712c3fd72f44f2dae6299e083d6987b8ca9c0d4f5a0abbcbc89b73bb2398fb5e4b3680d647b69fbac33e629084fefcacc27b03933678d8371988a7034bc453be99054c00f2dfc973d42879246979b275ea4e2d8d706f226cf93abe368c08a6819267248572ded24f9ed531b7906b23d809b44528096d41dd134c43706cbdc415b86f24ba79a37f34c64bf7d9df1c3c9817bdc306b8352a821e25421ec6c024b02a695412348526196df97fd64f57add9283fe7b3769109ee1c92f6e118fcb648bcb499a9410b047568feff9b785ff8da29070a660d508"}]}}}, @rthdr={{0x48, 0x29, 0x39, {0x0, 0x6, 0x1, 0x0, 0x0, [@mcast1, @local, @mcast2]}}}, @dstopts={{0x20, 0x29, 0x37, {0x6, 0x0, [], [@jumbo={0xc2, 0x4, 0x81}]}}}, @rthdrdstopts={{0x1c0, 0x29, 0x37, {0x3a, 0x34, [], [@generic={0x9, 0x7d, "1cdc1030f03e5a8e2f4f5277c1f150dca77b30a347f7e922770e62bb5f95fa107a9a15876e27223de24b6dad32ea4066924ed0bd5a2d02ab525084b23f5548690436d9066d549c6e185235b6d7ff479472bf2bd4ae636b6b7a8f71c65dbda144f5dee1583822868759121b9778ca51d5e0cb679e6980c2999b2cdbfa78"}, @calipso={0x7, 0x48, {0x4, 0x10, 0xffffffffffffeecd, 0x90d5, [0x1a56210, 0x7, 0x3f, 0x800, 0x7, 0x1f, 0x100000001, 0x400]}}, @calipso={0x7, 0x18, {0x4, 0x4, 0xfffffffffffffffa, 0x1f, [0xe5c, 0x3]}}, @enc_lim={0x4, 0x1, 0x9}, @generic={0x8, 0xbe, "c12ba06b11e49dea2345cba8c535afea227c90c26632dd1d0db09f4a272f68d9474ea79d96d6ef5ea373412266adb5e907e21b12504000efab6157aadad9046e4da126b0010113fd00d5958b239526d21a84c23bbfa4fc01559af57284e431a56f24e39f3ec70adf07488314665f6c8a4785e38662e075f596c3503b0d2c40702f1d831a475980a818710d1dd6ee95bd8d849225fe38ffe81a576836a872d3cf94697eea56ea405e5c50ad936382f09b9d12f89b98e12c4f57ff4fbf1971"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x7e, 0x10, 0x2, 0x2, 0x0, [@mcast1, @mcast2, @mcast1, @empty, @remote, @rand_addr="91a0e5d7aee07239a967fbb40e04dcbc", @remote, @dev={0xfe, 0x80, [], 0x28}]}}}], 0x460}}, {{&(0x7f0000006700)={0xa, 0x4e24, 0x3, @mcast1, 0x1}, 0x1c, &(0x7f0000008c00)=[{&(0x7f0000006740)="add9142b1670cafde9f795fd2d85cfa6e3a301e3b3d65416be0f44cf223f429cd7ba28906f1a20bad94c1aee9520f98e8434bcf6a4c1da2dc76dcf019f41b9da24f9ba126ee59c12d62a24711d5ba31b0ff787dda396afbf0209763362095ca599ddba395e853ba22b8fb27d2ac2f3963087982f5ab93a036abf6fd28c9087cfa675846be2fbc25781d4bec6535b211964c9a549017bd4265175113f300aa158230563ba2a940049fb7ffa78cc9249abd54af3f11f77a60499bf4dcc90631334ef2c482ee0b231d7ed77cbcbd4e8b62901b8e565d8bee65cfe3396eb3aee961208d2ae386859cf59b595c4cf80fa84", 0xef}, {&(0x7f0000006840)="52668c04343b69c8a881e92365f731a619e4079f2ce93486bd6c5816d9d7e5fa8598270cacd39b3e78ae2f6f064586ca22d9c24b30be7d371223811c009a94c16daef55fd8e1e57ab72bd3330b1dd44fdd812c53acfcaa583035347d5ec78ac444e241d7bfe3617dc8bb470cb9478f511aed8b5980b6a11d1bc77462f80707f088951362f48844513fb37f3ebff46bc613bcc5808b54872dfa2e768892dc699ce7084f14a0327c6473fc8e5e", 0xac}, {&(0x7f0000006900)="e8de0ba86e061bab35fb7320a5ff371c734171e66a0430667f9942d14c3a621ce267c9dfb53534892ce54c048f4c2d8b5763f0a1b382c5416c6121b51546127aaf4b48e7c95a836ff6cf2fcd673ded125791c8a9408ef0968c1c613a4a7796ea5244", 0x62}, {&(0x7f0000006980)="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", 0x1000}, {&(0x7f0000007980)="02fae2c2aa8384b443381a42471920a686aae661014dae2aa27a3abe792c24261b0b5d053f06d0238b7da55a79c9b7941105d57fed397af4b685cc54952c70d06d855271e38522f1c3fb8782e0262e9677d4055ae5c1a320d9b4785344d55cd8c8ff7308e9ec2ca18ab7e643bf7c35f884b125ef3a7f81499c1e978acda7e93f2fd4e9d1a70e86476c496fe0cf35c57a72643d4443acf78eebd4cbb20464a62ada8bd8a60c87ae84d49d6a73bc49ca94c64e4faaa67d3f17627455eca1dd0191487ba7450765c96955f5301bdd2d0f1815268534516dc5b49f96f4a810709dcafaca8833b7d609e7", 0xe8}, {&(0x7f0000007a80)="df91305acd73aad2e535db1dd04ad4ee50ba560c59b6cb2e2b9a32064df317e769df0e3e73cfcf23cf575db60754190eb54520a34752e9e10f1e0ae1ad638e0c38a590a61db5f55b6a634db97e09ef62056a6340e642b41ef07b6ff43b8af646c7a2e75e6bf10fa676dded9f3243cb98aebbcc62dbb225218db4f82b01c3041b5bef84bdcf3135e0ae1ae10f7e2e2137dbc802c42f300e306580731bf88ac1547637b4ce6d291ee73b39c24e8d3552fafbd8ce0bb472dfc67ae89ca83217807293d95cf3d93fa4036539a9ff38298c9a608bdb780c4c5e492a8cab287f3e17eb019ae64023024267c481ae706fbaaf283e8df5b767d0e9860bf7ad2ef05b20de56193b0903a4b673b10defedd2c7ff4bb114c3791e016f854ae08f23f6b749f989357a3fda8c8e4e157801f83da7786dfd4276dd3339bcf3ab4d21fcce49982b4542d2ed0e1f91067d1661e18c9dc7834cac194a375882ce8228bd25cbbf010454a5fa45f57cec790d6d0151cddccb80af1845cf6066d4d150f961a2e26a5e0de0c7dc73e986988622da6222ce7cfdc3958814aad8db8f3b1fb4eb049afbd37bb1a47f97d535058e1e9ffb68d17e5715eaa3a8853cf37c90cbc05cb31189bdd4db21066583897839ac3c8cbc81e68fd4b6683635bbd8b3adec51654a8aef0fcf5adcc1d4fcbd724e83a90df5c59dd6a1b8a8842570f8eb130ed208f6dcb82a8ff773526f2acc0d2dcab7ee3b1ac527d2e3bbc065e38f7d5c7f38bc74c270327307fadf583f6d511a2bc720a6856b0d359a66360b875534d4557a416a4d33d7934b2b528ef35abef0451812d59b643d413bb5df9ce7d9a8c4bd531f49005277a6157d07e7bde22a68045d468e709fae51beabb253fbc0ab18143f734f45e5c3345fbe56b89f2f8aa329aeaf69f6fc791453006b23c5d267a8a42dbc10855d893668262e3160ce36fa9e6c6d6a0e8a5ed8e514e565d98953f5098d9437f2c8c51eb7d10114774b99f26db85f8ff6dd216b90a884e217a8aa05eda4688d808601ebc43a250667f1b961c7ce60e479ab27eb975da0f0040beed7cff7c5068086f24cd96d77f14f8ee0264dd021952c2fb32568c67f06e209928716666020529a37baab3fae99a58792e3952938f49d4e0b92fee372eba59eb67ca6d7f09fe59c560ed080a75a0dc9bdf95504ebb025fd5b162041e3b95fdce1cae8f2460330bb43935a77bfe3409d4c5ad2ad41f210ff9e29bbd9f725e92d67754994813c46b999378638ea8ce08a0fc0901538b1f7bd53c177d69b8af15c2335f14aaa7db28f27bf5625ee7a4357d9e4be060e48ad4de1d5e38270668ae39db8225b913929108eb37ee05adae2c60361630ade6113be487437fda1627a4b1deaeccf5a42fa55ea01336c1b6d69b02ecde050c7370a7e499773d8e5fee1f72cd815b3d3fbe04d27d99017f4762509990c77cb5f9785d89bdcf082f3b3e4cb1fabe6aa83331ee9048e466e2b028f5a423fc4a222e107e26fed22e2756a7258347f34fb74c2e3ad1d666fbfb76fa917ed3a25b4cdb63cbb3e0fb754a61753f9ddcbcc5dfac8694f8d538a72b10d856c0aab82d72e60c8578d264f1bdca272befacc938e2103634272a5239b3136933a47933d693b06a853ef339ebd4471e2155e643ad18086e4ce509eedc9658fe4b04d684d031f45e2efd0637535c1d553eb1c9738de4f0e9b25f4f653ea692d48b44ba11668ea01d9d7614c5e3134559b8dde17a1d75a2347d7f3a8338eb6409204ef46999c38513e73693e029e90e040d058d3fa9c604d9493b5b1bda20a45cd17f1ca44831de1853f250ded757dce0079ffa2990b02525f4af653aef2966afe7ebe8d6446397a1040559536cb5143ab3a6030e42c30a26809cd332848e8dd5b2bb9fc4d95dfed6e0b98b5c310b0bb7b97efbc31ebba4d3c2f07177c2e46f5a633202b9bedf326f71c74f5190979931618f42012e2f881fbff123966fdb4822a05a190f5cb82be526ed571899687d7d549b7ed6a2e0820a2fe62c0b44517513b9f0eb4692682a58440e571dfd082c46bc57b355b9406500126832bdb34190273a046ee447ad05f0e394eafcf4a10525bb02a943597a530bb720fe88549be15e0aa4d6f2dda8851e09a996a7fcf19a89cb53ae0904319ebe16633bf63f018d33719b517d908e50e9a766998332d0994296ad01326d6bc46f114f2a4ed474f5f9403db62ad786c1610a7bf2e504f5410b61b69ab5cbe8833cffb4188025139baf4da074181ab633a21b2a0410b0e47c9d48803cfaf2191c03a96e428ccb886d6c514a3668791823f26d80cf7996fe22bc1c5df07d61f211210fcaabb64450c08ee5957b8c235c4ff636aed351bdb6726da5f85d68b698e666c6fd54431400630eec284dca138e445dbe00e1a145b5d6b4b196ada1263eeebf411936fe490dd08307571fe0c89f4cfa88e4cd346b7d78cc16e6dd97c667e34a280df724b0181a38da24367fd709d4d83aaa6aea6c9baa02a3e0f8841ad606d2031398634e45efe58e91e87e4b089fcdbb2caa8f525c66bbf53b1eef5281780338e6cbc829d5b5249740ce67c10d7951e536151d6229deaec731b7d39089bb3ee0450f2bc0790e615a66202479510c7a7393a442792327a8b4cad01dee2f9f8cdd6635de3155414e1c5534852cc0217ff60a4d29d4a868650c5b73d718ae3e1891c2cbaea2fdae0a98052434d0f9a32526591e186b689b8434f8a3ce5f2d72d09319d167d04b9c352945cd36c6b56fd7204259854e2fc81c8dd7eb6c75c852174e3f88a495b51039e6b4506c8058ae6086807ad785d24f420259683e0050af0cfbac8b2d0fa39019162fe62a4fe25d0a377f16809d2d856ed4490ae950590404ce66b5bf4be1bf64038f378aec353e4ae05a31856b7a8cac4d41f791beb008a225fdda5dd0f283a0c0541f568c68825ba813e3c0793efb6027308417e214193082e3ce69a94377e9539e24857c2597c4e876fcfc1d5af2d9c4f87f2466181f12edaf89d343f656a944164870ac3f0936e366e978becaa7d7fb1d9791e0f13f42bf204921aeda91b8a2c2764b5dea0f489484b7d0a3e4091fc132baf02d6436a2e94ee9333bf707d924a900be8492cf9dfa972a924c5ce8d4c55640bf4fd2b9193562df251dab9c1966b4306474a9cabf980db91fa2b8612c87e731b26ea179ae2b3246bf38566134d78de59b8a5046e5abcefe48e38211461173989cc3365914078bb23a80f03c718712132e6794b6b215a0080b651296710ab1305db9daf47f6427487a934bfd94035d22c0210baa9196f32245db49be9a879debe5ce6fa2aa699f4893d88377c5946da06b21c6fc53eaedce2b0553461bca4c223f6b7307aae870da3b31fd30717bad76ba3cf5d5ca3f883eec3fbab25be452f59af22442421dbf2f134e73ef3f18b98558af6a532478c43dab4b7d8958fa5a9616c51928ef9da3b08849b2556375e157345139eeaa368d815256639fcca404c6eede141facf420756be79d9af539f9eb7d8f6152af13729ca3cd76109874da8b4902b2c25c8253bc5c1d50c30931bc1c02bc01c6a007394aa217c3da962d7b5c34c90d20da0f8d36de847fc73a9bdeaa5f52330d79665100f05a591cba49727e88e6c9abf4e19e54adb0754c8d355b1db0a6583b7b0fdefede5cd28e0fed6b9b3310d008963e221031f97b62d4ca7dc83bd81b79da19702fd5c16de24c0eaf46f0c435cbbaba909d0a0cc4c7599b01c71e7499cde8051a0645a5ce997dc3733f257a45a80bc819e61fdeb35b72b003b98203747fea66017fa84249e4166facd1677cb8aad608373dd6feb366dcf72ee0024c6cee01668a9fcde33c8c1a6be515cd4c604ccc59c060d558bd0cd3d2ec75732de74b0303dda934369f658602c19bdc6eceb401df6ca43b8e5f3eb36aeb25e92301fb56e14a3450302660843bfcac3976e2a4bfeef06c86a92fad0f4f3e39d0c7989b1b713a1f832b6d548c90dc9dea320b4c32ec35761eabe662837e89d6f332b18944029abe075611a1d464670d8c52200656ad469e2724be07659dd2f7158367c5a4653c6b03c40ab17448530a8b62212f7155dbaaa0d60ddf796e21cdae957af7e16ac29c022c9335c20adb5f80e96919320f4d949981a3529cdae633603124d74efeea5fb1598d5de3109be977f1a62ee989ae95582bca0f88740018032e690c85b3c662332a44cf3119195e5b854417c67230c5d1cb23be07c7d2af52c3222a8c5498ac90800b18e136d8876797602968b232e0f7a825ce8e4f981a3b46b1e32cd60d17efb907b8291df101faf24bf188fa91c27e029589e67593210d63659ceb3d7052c2ea48ec4104061d07e4e7358f4bf6960710c6628e868c4a1d5b84ba5fb578e94394cc8ed75e09c2d9a5f50e1ba7bee6db58192ae3907079b98e28c01d8ff7f8a5fb0f5434d0ea07c022b441d531ac1aff838b455d42e2b26cbe6faa95c266cc04f9e2c828ebecaab478416fe98fbf604c7779206b1d288c05e914e429110e2be17c1fb340086629544039cb15611f2c492cbc521850d8d7b1836b704859a97466b61e061e27cb00dc38fa23c71650d06f07e19e6a32e027d2f5533c1ce078867b9064a1717af70819986b2de2a63aa88b53eb8dc8f4e05a8aec175a8f6a21db33318c3c2e2b10ff96f3e187eb6403e406931fd4bf480e035e67d05d58139a6fa5aa9eafe5cb8b507d6db021e6ab9e45ab7fe72ccf3d79794aef3fea496cf52adc96764c75401258a8ec0f9689bc59a467a2d37fe9c283e2f5eba14bff55dc1f26f1c8ad56d04cb9e0ac32d8bf0dfc7e91c5980e93630abadf58bddfb30f512f366cd817e629d0dce467faa286cb488577eb6c6636a2c2dfed65f18572844dc6c66e294d84c22aa4ee25ff7b817faf2550af837541230f8bbcbc15ee3041cc22e053ee20aa7b6b5439e2b2dcd614045a4a649587743ff579a64720eb9e99a2530d023db3a9358271113c1e853b6a7512181ef3017c67be67393e6faa2cdcf5fc0218a1de9e54de585c311af0d42e0f7a06fd4104b03e33142e0000674bb1c6471e4b6240fdc8a66998a27fa6df98d96c3ad968a667c87ade139f984c868f583ed5b688d853a7c4e110ab0898ac7c5decc2f255048c0d6a5d9f6acf3c6c96c4495d6f5afc9dead48ee541ed2a4691284a21bc8baf12fa014a2d46391e062f50bf58dab1e902a98012afc69e4d2ba9a558400ccf669e6263fe2879225a680fa49c1a346a43c440759c75d2741d2d217b191edf890cde053be43306f60cfb896845205ff3b8563b2acfae610deb1fdc5ccba67ba93b738d2dc812999d48af3ce009543d3cbe7350eaa9e1e7b70a6b4e09eeda7622a8d0c1c1885a261037963986568e27d24309e28102b772f9851b3bf94f18ce6aca2f772c9febb7b1535a8da2763015036f3c7b4f1f4d1823d77d9c92354f0fd9dc73ddf0795eebde8c87482f450c9f7aea216ec084768ecd8ae2b137d392c13441cd34025fcd28059802ce57812e5f2e832facfcf14170e2aaa0607acaec7d340a44abfe32e6c5af454de100ddf4b06c717a9e4a7ea7ed782fc9a474fc3f4ff781268c22cb01dfb0d7aa10d471fec64934a6a0cb1cda380fbc16b1b40c3eedb4541658236b88272e7372f930921ae77cefed2acf2c8065dfa50af7f80a1ab86e971b60f60a286c40b0fa610b93288e938f65445a12300d4c2413f7b257f4c09363513630c81fe36d298ea904c05d03c3a77afb76afbe4991a1a7356ed6f", 0x1000}, {&(0x7f0000008a80)="366196e4dcecd5129c6d75ee99306ff05459acb6682ae9487676ed7ecead5ac77af21e4e5567e03b2611fff9f378cb37312065f01b56d7119e6fc5a37640f90e741dfd609c2e638ea57e8ad39fc449fd2a6ab9c5e80d828d9c612485e8e7f63eeb162b12b0151d83e6c76a789164ebe31d2fb0586d5666c7ede275d3ba75d66d439e57c6e1e302a0ebf21e34ab2c8185b28eb6d33761a785d44080da76453cad53210fe6a7799746c42eafb116b99ea523efad708bd654165149b43525e96969fd9fe64ec72c983e5d45ba750d4dc9171309", 0xd2}, {&(0x7f0000008b80)="0b6b96c6a9fc94b9fe7e521f1c932828b5267a423b883dc9c5f0467a3c6d2b69a93f08a5af9c223afd600a1bcb6efa9a6a4569d3b1f8a8f36e9ba035e90e91cbeccb87106239305653c4262927352de002ff733c447783c1a17941fd89", 0x5d}], 0x8}}], 0x8, 0x840) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r7, r6, 0xd, 0x2}, 0xd) lstat(&(0x7f0000000200)='./bus/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r1, r8) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r7, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r2, &(0x7f0000000040)='mountstats\x00') r9 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000003c, 0x43, 0x0) [ 1297.156603] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1297.195728] audit: type=1400 audit(1569053771.424:211): avc: denied { getopt } for pid=5208 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:16:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x555557505000, 0x0) 08:16:11 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000003d, 0x43, 0x0) 08:16:11 executing program 5: eventfd(0x0) clock_gettime(0x0, &(0x7f0000000000)) ppoll(&(0x7f0000000040), 0x20000000000000ba, &(0x7f00000001c0)={0x77359400}, 0x0, 0x0) 08:16:11 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x9}, {&(0x7f0000000780)=""/82, 0x52}], 0x16b, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000000380)=[{&(0x7f0000000680)=""/87, 0x57}, {&(0x7f0000000800)=""/81, 0x51}, {0x0, 0xfffffdce}, {0x0, 0xfffffffffffffd08}], 0x15f, &(0x7f0000001f40)=""/147, 0x8c8cd787147dbc58}, 0x3}, {{&(0x7f0000002000)=@caif=@rfm, 0x468, &(0x7f00000020c0)=[{0x0}], 0x14d, 0x0, 0x8e}, 0x7ff}], 0x3, 0x2000, 0x0) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f00000002c0)="605ed4c87c76cab91c2b976c611398cafd7f4b06dcff31b4e38a55f13ee82ed151d40cef20ae70ef435fcfbf37639f5570fd7af5a086eb3a57b5945a9776b9a553b0cade014c7e7bce36fdf7ea3086d2566565ee005ee3fa06ca2f3f446387296b0beaa83b85ce673f9d2d76cae41f46c1c3fc971196657d9f4e2cf3a3951dc02152b6a9f782621530d2fdff88fd144393b289e5afef131789c8f9be4a70be280fbbbd7b35fad653cb5aceaf03f8bb50bc5ff2b13f2b43549b791979") bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000200)) r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]}, 0x3b5) 08:16:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f00000000c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r0, 0xd, 0x2}, 0xd) 08:16:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x555557527000, 0x0) [ 1297.420249] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:11 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000003e, 0x43, 0x0) 08:16:11 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10182, 0x0) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1297.629364] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:11 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000001c0)={r2, 0x1, 0x6, @remote}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x541a00, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r3, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x785caebe56f6d2c2, 0x0) bind$xdp(r2, 0xfffffffffffffffd, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000100)={0x3f, 0x9, 0x7, 0xc, 0x7, 0x81}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) r4 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f00000001c0)=0x7000000000000000) 08:16:11 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000041, 0x43, 0x0) 08:16:12 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e221cd47b800846dc1c16517484ff509d52cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04019923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6379e664536816e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a1d97c2da886747368f19712ca0c71500696f9c3782ad35fab32a2b650668a85a4528afa5aab1a529da60c0898fc8abd5f5dc11d55f5e3330e1ec"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 08:16:12 executing program 5: r0 = eventfd(0x1) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000042, 0x43, 0x0) 08:16:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x760000000000, 0x0) 08:16:14 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:14 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x7, 0x200, 0x6}) r2 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r2}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000043, 0x43, 0x0) 08:16:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x1bbd11d70207a56, 0x0) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f00000001c0)={0x1004, 0xfe8c}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 08:16:14 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r4, 0xffffffffffffffff, 0x8000000000d}, 0xe) r5 = syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r7, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r7, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r7, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/autofs\x00', 0x104000, 0x0) r9 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000029c0)=ANY=[@ANYBLOB="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"]}, 0x42b) r10 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r11 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r11, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000002d80)=ANY=[@ANYBLOB="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"]}, 0x3ab) r12 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r12, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r13 = socket$inet(0x2, 0x200000002, 0x0) r14 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r14, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$EBT_SO_SET_ENTRIES(r13, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYRES64=r14]}, 0x80) r15 = getpid() sched_setscheduler(r15, 0x0, &(0x7f00000001c0)) r16 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) r18 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r18, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) r20 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r21 = socket$inet(0x2, 0x200000002, 0x0) r22 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r22, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) r23 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r23, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r24 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r24, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$EBT_SO_SET_ENTRIES(r21, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x101c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000004240)=ANY=[@ANYBLOB="9a84c7db8d7f5a2bf01b827c1731c75d4b325396979398b98775e060f88791c858bb2b9b5de9d2b5deb2cd7c9526f28981cafb781b5a1a0e91ece59ed2eab304a9f083fff8c07c55f5e3f752ee27da0920c9e283ad6366350eba7031d747b2364cf30a5f65218491889ff2a0d12adbf66b729e900806f17765783b8be431935c41b8303e66e8d3c4b48d5ed66159aca18a0614f1a1f8f400cb3bd5480bad033cd48898d557416121bec18fa33252a9cbd3cfa4efde5316a7949aa70690fdf00c3b9d739ce95a0cbff39e0067ead774bd564d1409baa4bc412ab058c231bc8419302fc11fcc0275c63bcad9e8fda61cee1afb393ddf4092702dcc43b4d0e8c117a506796f2c44cffc2b9eed6f87a4019ff02475335ad12e6f80846a33658d034ac0e6b117b1efa454acc100e1188eb6c37a892a21749a1c69a7cdda10d344973574aade3caaebdb076b0f286ba945be803209769197e2d375d9340a86bf1e439cbbd60ab0dd6c84bf037aa464264afb9bc0fe0f9925e8022ea2f7bcc22f908786dcfd86a3b3ab1790bbfcb20e3e8c7932499ca29f440aadf1ef4462da077cdbbe2cc6b1ae339e333483162ba10dfcbe7679d193d72a4969dd6b68bb618b129c6af4dd17e4c286e5fdab92059bcf0c853eacc8440a5ae0583f8db2dfd266756624929b2fb7ae33395af4f82f27de1baba7c304ee0f390330ac860fb6eae78afb09c3956d4d88d1217c8b3b560ce798f06df70cf34ad800d06b0490a1071512e08b5209d9a27e1e972b4c916b4875971a1269aac8f12a02b1e9386103393f6f061ef167a23a293eff6d51b806d6a0f8bbc496959be630224829b23298dacb8f525904fae40411f10dc3905cb022b7867b8fce0e6ca24376250b35e3da9debb8135356ec9a6c83f79ee0e06f7452e9221a0950d776a2fdcdb9a97ca19b84f9f1902223cc9c9a60c05fa2d4e7965102e285fc880e495f1199d342eef34703e9c0330b698331f8f9aedaf17d5e088d8c670907dd926e20ebb4fd4a76e61ee9cc6268c7f6dc07aaf22ea40dcdec89412c1316f12ba68dd0afa3340595c9403bd4e1587f2f5bda45509a25ee6e16b2e93d9055ced968844ca09f78b6163242e609d8a42b0a6ba8dca5e5c0c30905f78bdf8ad036d8671393473b60c2dba4539d04f9b04b412aca94f39fc9edb4114a00df5b5d21192aa5817abcae2c3a956cd7bf621061ca0f04c82bff1e73c7a0a1207ecd2e427d7a2e3ed640618e48fa8f15afbbd13b7580261d91e8cbd1cc36c4f32ba17b8ddc800d0e079f6045aebb80489780578eb32f14218dd9d524b8a50c44cab872c32c9a5e347c333539d7df6e566f457e40d293bf27cb9659d7bc93576e4ee45bf309791d56e1fbdc7ce93a21381e13eee605633621cb0345b84628f55c754695b164997b4bb59f20935130c790bd08d243b7dd54c16fe3d7b71bc16b4e389258d151c233048eba7891572a773efcd9fb49acf04d47d2869c24491ccd11f28f1750f44e7503bcfd244e75e8d85e0046ae62d2081fc2c7809554ba0bcc32b9b0a1734f303a0398234b50fc6bfc318ada6521b787782d539c38396890a1546fafcf086dbe5addc9fc6b230468a8b7325e59814b571dad5d6e6bad1fb34304adc9ce3ae63e71502043d20333d06f046232bf6df57fbb374d070cb2feb59221405245ed234e164443d50288565180d8d31c1176bd119f6f258af6c695880126ddead54d4f3f35039df1a18fba973042266137b1dfa3e6a04d7fdcbdeb5e8c0a5a381c3fbd7b0534ef84acc15ae2acef4e0669b87e0034db0c1542f57be881c97242055a52013c665b4226c5ab63c5540e6b9ec25482bb2cb369abf5f060b703a505e1d8dc1a1039fcd0d1130a67069a745b570d2dfbf96832600bf23bfe2905711737da095fd9cf65fb852b1efb46a0141130d0cf2a768b9dbd12ba66ae543ac1dfa93e893cd418cccc534f6caa77ab2d14dbd973159affc389bf7429fcf48741039532e95fea64e8be304752735048fe5d151065b0d264f0ea3086157dd14f5fc054d9979a0036f4fc3447476a8c518350b410fd281642446248c928f871fea6025e8ff1ec5075b087183fc1259eb0e1ae264bce765dc7eb68c26ec67f8a5ce3a2ee1432ecb2ee3faec48a796ba6238bb2c6d06ed29d930dc5a96467662676a7c0c99652dc34b00f424e19d4e93ef00ff083d8ee112808fcb41ae25802d11338695ea83b72d99c2790e5952f1199d51794ebe63c123cdc3c4188183bffc47ce10a0dbba6a847ae0852f45d22028fe70d435aeeb75d2148b33cb3a0ed89497f336ce28193022e0545154f6ae4ddec5014bc29562ed784a69f69f09c6c3abc693b4465cf27e91956fde7d8345d015af4cdf066683a0821b2e47e13eb521ea509f89fd164409fb46b883b3a2df211ae5c2ac4e10c600fc854d32c359dd8e9befb01525821ce5806df3eaf854d32d1afa45dff84aae60e99aee31b3537f3052a4b7ab0e80d8940c67d0bbd6cf63f3583ed8fa30fe494ee2400f64c61c23f0c8de776d19fea1e8417e068104d00b6e73ffa93b93786a7f14b5a3b0609e4a1d60f1bdbe43ed3172314c6f99e44d47a8945f875701b3d4c2212271b044dd1f3bb1cf30d33d3a96242462b61e803e2fae8ef12824ac38bbbda8453c44a476f45a3cb0229139eaceff4c37c8bd9015e04b2dd58ead12f37034e2ee16ef10b3fca9ce19255f59505703f108076707dfa0372d431c4925292ca21524bb608d913338706cc0c05cb6fc813d886ad6aa931e699bfba1b2870a18eb62a51299af6a1db464c703cd4026b4834289420267ca2474f94ec0fdd2bcc376858c969fd24ae492659f1a7f3316d09d173826c146288aa434d28a98fc04ebe5ca5b6683b4382731085e3ade37ca67e952418fc2a94a92dcc5e10372ae19d1335c65b42b1d976f827e6e5fdf2482873f767fbe25345cb0a3f87f1c9022f0c4975ea002fbc0c0a5405e5299b64854e2afe1152d6e08ec73d9adfa7a5d403427bffd554f10a4d6a49205f96d24be01667f08b949613641c598494daf3adeb8cbe18fcc031a5bc5a60d5c616c248796aaaddeb567154863a516371f82641dbd117ad1c4cc1ff88b8fac7efb53cd24df93a12cf5a9dab66fc15c36e141067f482cde95c8bc2610b97bb3018f226feaa03a3bdbb70677804db7fc897602c652a3142cddbc7fe10c2e8dc04b8cf3075ac53b650bf55b1413281b0a41b26e20d5b6c762a8358007f00b5a7504d46c87af401ed72c72df2a3693594216cafa78ef0dcb646e9f74532c76c92ecc85f62904bb0f61915040bc8fe0c47a8cb43e4819c2f370ca64b17178b38d0348b02a2b20fb94c10f3f5bd9cb24c40d8f274ccaa48193c4fff079f37a3ced3ca81557845be22c693df3d643e0b0452881bf3500ad28808b34bc79aa0f705f3689f6fbf318003b0d3def65e757a37e3a6ce3b86de86c58dbc04075abf257af66d577f2cfaea3e135ed87d35c4e282a1eada7200ff5d09d4bf6694a4e51aab9fe0c59827af14e4769165e864c4bf0f4a998802c35636ae52d29e2a6172b8cf77605aec55c26a9a71534d52377b0bc65bb1367d6282077774089b765e8b556508b670272cad7d23804eb131c2aab1e74e660a696f381c83b718c4f0c8e944447ce091a883aafa3911dedb091dc2d40fbb26d8d83c8e5d82184ee27e012f774832a09a733616eea600aa8f1260799f367c1e5c34926200cd15f1c75b31011e265cc5bb9f584951c7ae6168fb3133e0d09b31dab9805ae3d1588def22ee3eb5042b386e18e5993246806faf2d1be06b01457a5a6971ee3dc9799bd30eb36b7fcf3cc8cf69a00c2cb1c49e0fdae7e9866214d514fc53303c663de8b2ca88832f2ca30181adbde115c4fa6053fca70802732f34bbb845133bd2fc7351968d211f20e510af4a4b3dc1e08b3d29107ee7ad0933e959812e319482478da00f52c034068e4b67724faf7c428944623921c4876a2877ca818e202f4a0ddcd97492cd416c1767583167193cc04173882c69cdc4c40d1340be0daddb3d06eca5da1ae0abb11473f6094de9e113d3d8a393c034b127ec4dc77c81918264d184028f91602f4686ca6525af8663ed40dc1fb9ff9b37b247c974632e4826080e9758ad2df9a072bd63913c4acc0ad9eb6d92faebed4afdacf77c529a81c86a5226bac644a6183c36d07cfc1b81a88ad96c9191aa66b7c0a72e3d9b14e8256900c3a5af128bb85a2c962b8d41125303f91d261708938782b5bef4d1b790691d774527ee9c9f0ef5dccfa47ae9c616eca6db69af0c085802c6b34c3629d2034e9d904584cfa362a4768a68857b186fa8e0200ad5d43442d6f068bd6771acb95001efd8071f3b70274bee0ff130a204a6db73c43e3952dd8b05a0691c879dc78e93df9ee99f219c3b256700968178484c90543fdd5525a606624af1588c5461561b6f4e021f159abade5d75f429ffb502b383b6c53943477dad9034d55dcb0a1b0604cde7a343e0b392d971f70e298137e6e9a1757002085b99953bcecaa74f2327ceec942a63357d9e466bb2698928c915e2381b40e4dc955b93040f5f1c4fbd7ca0c7c392c88c138563ce95e566afd4ca68bed7e3f35c548c0750abe825e4ab90e83f1555be97b3bb23d7d96aead6e98d267242ce08a1536f37391569279090877ae91d1b8cd794cb951cec425683c7edad6b2d6e5606777a8b87bcb6b87ead9192ea92590460e5d771157a488671b3b055ec800f21afa05b07a655056c7501192d0a52605872c29cb5ebb55a487d53ccbcf01cd14c2ad0247ee92ec715fa8fda3163919d8a2c3551c9bc41080897eb9a7ea96fc7a680c231a8de03145949c3df8df749937baf5fe405c29bee9a8b4b8f8e3036b46707edc7d3987fa5ea6688248cc4bb561bb31ccf8f9e88b8acba22fbcb62adc8db8a22ca66c3ed44ebedf94d1871ca7b6f2b6360c0b8b496c30a8f9a9b5ac65ec97bd4dcfac7fdde0b6ebd6b2316ecd1836519b71e439a78f2fed01822e32b03a0bb44ab3776725b3254290f48edb7e8e744d724ec34549711b169fc180b9483d24c7fc3093131d568bf848b925c7db827b1320da519c9cf09bb78cab7a9f325e08716a4cc43cc0bb2a4e9f9d743891f1e168c70ff818f1b1b581bdc83dd165bb85b3975e8eb14875d961ae31141bfc033f1a15b8d04654737bedab0e40638c5e0601d9e0e312deec15899da7385c8ab37cdccb1409a0fa619002536a4cb309b7006b5ff4e224939b6281e2b2d77d05851a22d55c86919f7ed36f7dc636a19e0fd211667c0e72add1902d69149cd81c26296697f405aedecfaeea17c03ddab0dc2edd8f39496167fa0de10946783fd0a3e7d0dae4ef1d5265f4354a70c9886eedadefeaff2ed0e41c716269e05b60e8e391d5a8a16eadffb84fb690b48632d9cc57ca06a29fc9371e6cf2e0ac4db9e5c10e6d2e3929e1697843c8aed4a6a4070157b3d395d5101eeb4b44c610acdffb1bd9342397ca6adb6e19b31106c191191c07286c3a915ebb7ababdf95c6a0f8a2334d27ce92d52e6a0b2584c74e3eb016c6aa6b2ce249ba1dc6e44f6d9b76603d26c6388eb3897ab45f7508eec7f394e95bd829d357959f7b1b1a195240f62c890e32a26aea047c91b70af5db1b49491c8222c7ab3ef6312ff17c102940f507a40d3273df2302ef3274049d543ab995274325c7125e446e4735bdcd2e744c7126bd21d2deb63084b00bec6e9ec59e3864122b45e146cd96bf8de867", @ANYRES64=0x0, @ANYRESDEC=r24]}, 0x1094) r25 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r25, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r26 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r26, 0x0, 0x80, &(0x7f0000001600)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r27 = socket$nl_crypto(0x10, 0x3, 0x15) r28 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r28, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r29 = openat$random(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/urandom\x00', 0x40, 0x0) r30 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r30, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) r31 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r31, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r32 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r32, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r32, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r32, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r33 = accept4$tipc(r32, 0x0, &(0x7f00000015c0), 0x80800) r34 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r34, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) r35 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r35, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r36 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r36, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r37 = fcntl$getown(r3, 0x9) r38 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r38, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000001680)={0x0, 0x0, 0x0}, &(0x7f0000002700)=0xc) r40 = getpid() sched_setscheduler(r40, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000002840)=0xe8) r42 = getegid() sendmmsg$unix(r7, &(0x7f0000002900)=[{&(0x7f00000002c0)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="2157ad8daf558fd2af92792d841cf90e7fc7ab568ded363c15d0ef0a9ddad93a3b9d8319d41f58b419e09e94bf94a1dde9e4036520cdf1633dd24e4f08433b2394911e11a4f4f164f4ea91608775371229314b22825641244b3d172fc899dd8ba22389750f57aec5ab9b5af74c79af", 0x6f}, {&(0x7f00000000c0)="df", 0x1}, {&(0x7f00000008c0)="5d46f5eb2784cec9cb9b4a588e355f99f2642e8129958169f7673324e740fa099ff56d243aa962f83d4f374828459163fd20285246d95c0675b283fb7424a472a6ba9e343a1d21f24a6f7935a49f14be6306f9b5c56608cf146f496d90c18f608dc03f029651a0dfa6afa6dc9ed45387ea9b7235308c4135e2dbf3d8c973d83aef1d91a15e49cd556bf80f79c67f672494363eaa9b3dcde5290c5bf3163a9d6826177cf3f925f077e6078714da1e35ce2a", 0xb1}, {&(0x7f0000000980)="87969e2552a1aaff0f7127b8de7b50f79c478a7039590e9a46ac563b377be5cb34320012fbe044f9a46b366b1e0c1ae9a8e68ba139217708dc01bd5684176405c5f5719074a6626310628effc8e8b83a8a35a27955b36a29491fc6dd1d8f76a1a408a32fb4c41b0906e86e92941980285e4a6d2dd583095e270b3299b1654867d4c9f6e1ee27a971f5b2a9a06c03b0447587ec3dc52430711e5bcfa404b468bf8c6d6df3760f251d95ab2d00", 0xac}], 0x4, &(0x7f0000000c80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r3]}}, @rights={{0x20, 0x1, 0x1, [r8, r9, r10, r11]}}, @rights={{0x1c, 0x1, 0x1, [r12, r13, r4]}}, @cred={{0x1c, 0x1, 0x2, {r15, r17, r19}}}, @rights={{0x24, 0x1, 0x1, [r20, r2, r21, r25, r3]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, r26, r5, r27, r28]}}, @rights={{0x24, 0x1, 0x1, [r29, r2, r30, r31, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x120, 0x48040}, {&(0x7f0000000dc0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000e40)="b515b0c35705c8c0b5d4c66907fcf4820c355b5699340ae2c0f1cd430974265dbe587e55", 0x24}, {&(0x7f0000000e80)="5cf29037113fc34d4d87e2ebdd4bf4bb27b2c80a1a050fda878f3ecc2ff118145577f43b44d71de61d9ed3405602e500707b7478589dd7c1ee012aa8dc6c5b574b3d24706ed2e5b8c8d0a0a659e24f27a2ec538af8b89b2d7fa9a4801bc81de064c94daca1e67b2559462960fa5b8f46c4fe7d", 0x73}, {&(0x7f0000000f00)="b72a7931f8899e19bd6750db4c6d853e81bf2a6f0eaee54e305d8cc9ef3e1abdd08da8f8699458837aa79508f829b803f462fece183a52af691c146fdb8b63824f4c919d986ddad97d0c355aec4179d2a2815e721873e30600008d2f06b441c3ebef9dad4f7056312425c87945f358745730325a9ae7141ad6dcb4c474e500e978bf95f1a981a7ffabf432a9820cc633e80ee4dd55bca1268c12775ef321d7ca7d8807bb2009af07adbf873bc9cd9c8d3dc03d2dbb484476a6d4a6", 0x1a7}, {&(0x7f0000000fc0)="a0ba8a4ad39b8dba9314b065ae81e837199b5b6482cfccd77d7ec123305c61161dc84996a295820b4310e02c5ebc477357c3e75e41fa9bf8ae5a013f67fe72a1b5cd6c76f3ed8c9451f6584d16fd528aec186f89f6c320db810b541395e16cbcba07ff459b9ce6843b344bcfc56d2441878786e11459b1904af47499ac8c64365f7ef10abc0575177ffe90910ce15526677e276f7285d5028b412e297e935562810dc7263abd954e168eabc04b409508c317c070e6583436d7e6f752f5df1c", 0xbf}, {&(0x7f0000001080)="1b37c9ba10960c7be0837306f235a6874ebe9d7648da3676b3106f072a83815a3fe12f3b430ad31cee585ec2099023961f9d17dfdeb9d139e994622505a4d4bcc3704b92cf955d421186bb20f5d642adf0e5a16cd0989c53057da9b8f60f95d7f3daba23c1", 0x65}, {&(0x7f0000001100)="0ff9356f20af64a5aa3473ed8a3e32f5d8eb4764cb22fae701b38d3313b04e254e3c833e1c58bf53a0accdf5d28c04cd6bd1a5b4d51478ed421766621f7727be30c58267c724848ba7a69e7dec0d262787d6c87e0952c0302c07fddd7692f41342203a92078a90a6a751051894bbdb", 0x6f}], 0x6, 0x0, 0x0, 0xc040010}, {&(0x7f0000001200)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000001280)="dbdf7ee9da081122b0bb8154c86ad2dccbdfdf210af8d37fcdf67e568979242caa7c566ce6f5563ec7431fbc9977f454109162f58941aaabe2f373b3c5369e65970223a29922aef92ed0e68ff4480404824b7edcedd77c35d72f56aa845569ab4a21b7abb6c264b5416631ae64ed21b59986ccc4139a6277b69583e80c63a5cd0768581edd12c4dc508b32bdacd2e1ab15bbfd940b5014d3cfba6f3c7c5bcfa0ed0e77673665febd13499e74475baf65a1b53219528eeceeafd452c4e7333a9cf6e9e26122e47de5edce214a3b2189301e0754e69210f26015a88f6e0199d525ecf652a91fac34bd58fc1c9b3e91ace6b233ca", 0xf3}, {&(0x7f0000001380)="5485980f226e752e67c348a87a237d1c78ce1c8b35b712f20e292726af4357ff4998aa369d95ae7afa1cd03f788bad6f2f32fdbe013a5bff90a3", 0x3a}, {&(0x7f00000013c0)="624d3b1cbebdefb392416e7980", 0xd}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000001400)="9ebd76546a05ec1b73f977eeb6f539bf5fc40c76312724a2673150d2d84f50b2bb86e3c2a52caa3bc530ea4fdda08be88da5c2912325b391c2c68261c5d6d359b73bca8731f11934a34ed3b001366dbd27d15693af27f1ede382710d78185612d5283963e823072ad443d224d91147", 0x6f}, {&(0x7f0000001480)="32739e0193abb77d9b3f46bffa16b1876cd408da75e24b084ea9b0ba39c2d0947ff4de18954d8caa5d303543a8754abfc2978b61966d519aa530a76a95ca97981743d87fa2931356a91eb865d005678f119e0408df90eddaa6412a1a1df78aaaf13b12", 0x63}, {&(0x7f0000001500)="3ae5f70e427e", 0x6}], 0x7, &(0x7f0000002880)=[@rights={{0x24, 0x1, 0x1, [r33, r34, 0xffffffffffffffff, r35, r36]}}, @cred={{0x1c, 0x1, 0x2, {r37, 0x0, r39}}}, @cred={{0x1c, 0x1, 0x2, {r1, r41, r42}}}], 0x68, 0x11}], 0x3, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1300.686798] nla_parse: 2 callbacks suppressed [ 1300.686807] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000044, 0x43, 0x0) 08:16:15 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:15 executing program 5: eventfd(0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x289) 08:16:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffffffffffff}, 0x1cf, 0x10, &(0x7f0000000000)={0x0, 0x5}}, 0x29) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x4000000003ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$VIDIOC_S_AUDIO(r4, 0x40345622, &(0x7f00000000c0)={0xa7b, "cfbf42fbb3529be52140cc6c029047f28938d2283f0a864d818f3602e8db6ff6", 0x2}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) r5 = socket(0x14, 0x6, 0x2) r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x1, 0x1ae, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000180), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x10, 0x0, 'nr0\x00', 'dummy0\x00', 'syz_tun\x00', '\x00', @dev={[], 0x1e}, [0xff, 0xff, 0xff, 0x0, 0x0, 0x94c83fb95b3a6cea], @random="e58e4e1bfa36", [0x0, 0x0, 0x80, 0x0, 0x0, 0xff], 0xe6, 0xe6, 0x11e, [@ip6={'ip6\x00', 0x50, {{@remote, @loopback, [0xff000000, 0x0, 0x6a8a1924dcc1386b], [0x6a41cac693ed68e2, 0xffffffff, 0xffffffff, 0xff000000], 0x1000, 0x6d, 0x20, 0x1, 0x4e22, 0x4e24, 0x4e20, 0x4e20}}}], [], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffd}}}}]}]}, 0x226) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="cc01000096010000000800000000000000000000000000000800000000000000e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"], 0xfdef) r7 = syz_open_dev$usbmon(&(0x7f0000000880)='/dev/usbmon#\x00', 0x7, 0x4001) personality(0x400000d) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f00000008c0)={r7}) 08:16:15 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1300.904732] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:15 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1301.066783] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x7fffffffeffc, 0x0) 08:16:17 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000045, 0x43, 0x0) 08:16:17 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) fchmod(r0, 0x8) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x480000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) r3 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r3}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r1, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='posix_acl_access}ppp0wlan0/,em0*eth1systemkeyring\x00', 0x32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0x955fbae4c4e72b79, 0x2}, 0xfffffffffffffffc) 08:16:17 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:17 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r6 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r6, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r6, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r6, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) r7 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r7, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r7, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r7, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$KVM_SET_IRQCHIP(r10, 0x8208ae63, &(0x7f00000002c0)={0x1, 0x0, @ioapic={0x201b78fd9c7dec96, 0x6, 0x0, 0x1, 0x0, [{0x1, 0x5, 0x101, [], 0xfb}, {0xfffffffffffffff9, 0x58, 0x2, [], 0x6}, {0x5, 0x589, 0x400, [], 0x2}, {0x1, 0x3, 0x80, [], 0x4}, {0x6, 0x9, 0x6, [], 0x9}, {0x4, 0x2, 0x8, [], 0xffffffff}, {0x69c, 0x6, 0x1, [], 0x2}, {0x3f, 0xfffffffffffffffe, 0x1, [], 0x3}, {0x1, 0x81, 0x3, [], 0x8000000000}, {0x5, 0x7, 0x9, [], 0x7}, {0x0, 0x1, 0x5f6, [], 0xfffffffffffffff8}, {0xb515, 0x8, 0x3, [], 0x9}, {0x2, 0x9, 0x9baa, [], 0x358}, {0x2, 0x20, 0x8001, [], 0xef}, {0x3, 0x3, 0x5, [], 0x7fff}, {0x4, 0x7fff, 0x2, [], 0x7fffffff}, {0x10900016, 0x44, 0x9, [], 0x7}, {0x6, 0x6c3, 0x3, [], 0x7fffffff}, {0xff, 0x5, 0x7f}, {0x1, 0x7f, 0x1a3, [], 0x7fffffff}, {0x7, 0xf, 0x7, [], 0xfffffffffffffe01}, {0xffffffff, 0x9, 0x5, [], 0xfffffffffffff513}, {0x6d9, 0x80000000, 0x7, [], 0x9}, {0x901, 0x2, 0x1, [], 0x6}]}}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1303.787838] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:18 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x7fffffffefff, 0x0) 08:16:18 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) 08:16:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000046, 0x43, 0x0) 08:16:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x568}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa0000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x64}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x9}, @generic={0x5, 0x6c, 0x10000, 0x100, 0xfffffffffffff819}, @jmp={0x5, 0x56cf51cf, 0x2, 0x0, 0x2, 0x1}, @jmp={0x5, 0xa7, 0x0, 0x3, 0xf, 0x1, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0xa, &(0x7f0000000200)=""/10, 0x40f00, 0x2, [], 0x0, 0x0, r5, 0x8, &(0x7f00000002c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x3}, 0x10}, 0x70) [ 1304.002804] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:18 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$VT_RELDISP(r3, 0x5605) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:18 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:18 executing program 5: ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000000)=""/190) eventfd(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ppoll(&(0x7f0000000180)=[{r0}], 0x2000000000000144, &(0x7f00000001c0), 0x0, 0x0) 08:16:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000047, 0x43, 0x0) 08:16:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x960000000000, 0x0) 08:16:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) mq_notify(r0, &(0x7f0000000240)={0x0, 0x22, 0xb2e575306823eb31, @thr={&(0x7f00000000c0)="357318fb5bbcae65cf1551bc50421f935a7b05dbc18d602b9f6e6e943f8c9ab7e8fc73f4b61217dce7d073bd5c6303634e5141e9dc88b122db814deb02c215d1fe58c5fa3ee4bd711494f8f7ed66ea8768da3dc4745aabdbccf1a47523d2b9de430eeec105b390ab8a977c3022bde33101b42e1f2707b9769217766aa04cb05ee2285038e9083c1133a409a1ee07d26c396419fd6a8ca2811f8fe422926d2edde0935bf694e1529035f8be24261e1a6006ae0c69", &(0x7f0000000180)="e108ba36f67ff8f9e9b23ae4f3721aa2b35975c883d561458a23a8fbba60fbc3f163f418c8cfb52846ec907df90ffe6bd42e7ab0bc68ae66d093685f3fd045b87e1f12a7bca833711cd74db3eb9be6df71c32b0f71754fe01be79d1f7f23cf43f03a08475a03d860b9d6821b4ec62fa7029265d0b8106dbb5bb2621215679d258f9c31a9122c83056fd7bcb980ead030cea514132e5e26d8167f3c288439898ba81b7b6d83448ae7197aec0092c34a4d1c7a22e68a20103fec"}}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0xd, 0x2}, 0xd) socket$nl_generic(0x10, 0x3, 0x10) [ 1304.226072] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:18 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000048, 0x43, 0x0) 08:16:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = dup3(r0, r0, 0x80000) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) ioctl$TIOCSIG(r3, 0x40045436, 0xe) r4 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r4}], 0x1, &(0x7f00000001c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) 08:16:18 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @remote, @empty}, &(0x7f00000008c0)=0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], r1, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000300)={0x10001}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) fsetxattr$security_smack_entry(r3, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000200)='bdev,\x00', 0x6, 0x2) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r2, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000900)='/dev/autofs\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1304.384553] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000049, 0x43, 0x0) 08:16:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)={0x3, 0x9, 0xfffffffffffffffb, 0x246e, 0x8000401, 0x80002}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 08:16:18 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:18 executing program 5: eventfd(0xfffffffffffffffc) r0 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0xc00) r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x108000, 0x0) r3 = socket$inet(0x2, 0x200000002, 0xfffffffffffffffd) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r1, 0x402}, {r2, 0x200}, {r3, 0x200}], 0x4, &(0x7f00000001c0), 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="ea454b15fd6737cc00000000000800ecffcc54000000002000e62f3b47458ac716325800000018d86d75e7591714890d5037d45649fa4f745dd4d0000000000000000000cc7fec16af1c55aad5a129d20f14d13db4ee6f82bc551f7fdb660e621ba3ab51dfdc516028d361cdcc2788aa538c5dec2dac46b3d9528d6a8751436c8246376a4aec2b6085d21dc1700e095d5a02af266308da910f77d7a8386a6cb20f7f3878f05d0a1c3d27b733"], 0xfdef) r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000180)={r6}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r7, 0x6, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x6) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r4, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5000004, 0x180010, r9, 0x0) 08:16:18 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000002b40)={0x0, @reserved}) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r2, r5, 0x1d, 0x1}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000300)="1e3a9fca3c8babda5978f2ea484b0504", 0x10) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r7, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r7, 0xffffffffffffffff, 0x8000000000d}, 0xe) r8 = syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r9 = socket$inet(0x2, 0x200000002, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r11, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) sendmmsg$inet6(r8, &(0x7f0000002a00)=[{{&(0x7f0000000900)={0xa, 0x4e21, 0x1, @rand_addr="bc375624defe34472013e0a7824e84a9", 0x4040000000}, 0x1c, &(0x7f0000000cc0)}}, {{&(0x7f0000000d40)={0xa, 0x4e24, 0x800, @local, 0x80000001}, 0x1c, &(0x7f0000000f40)=[{&(0x7f0000000d80)="d895d58a807dd707ffe27249de8b0345d4c28d770f4b9a591b6e78b194d91c048140e2c1a6b5b97fab35eeeee41c7879938184435c7754ac8e2b82a66117972c323bb0bda2035a42dab149e412b28ae97ea2f2023b235aba8a79445ede3b2b050b99b65e27221c3d9e01", 0x6a}, {&(0x7f0000000e00)="63522a9e7450c6ea3f71ff185bd3a36d4eead247b3972a296b893e0ef098", 0x1e}, {&(0x7f0000000e40)="9dc92f5f3aeee73d202888385bc2c6b462d59f7c963de238fddbccf20432e50c0a1c47eb6648fb8963707fdae95632d34d206ec880e2d6c9f5b5b67fb3e4646e6a01eedc64dee9d9eb1b50ae0389a6694134d9d3c7674436f2df49ab54e9583d73ee18e49512820ba0e3fc28b9c1c280b053085e2f8dc01cc335d7d18d301888d411ab802c958fb99c59110bf22c2b56fd69f68e8771186b2c5da970c1e3f23ae4ab36626a9c9a9b788ab7ff24e99610b285f3e949c6f78d8153eb052aaccf38423e172a1fcd533b75e9133613", 0xcd}], 0x3, &(0x7f0000000f80)=[@tclass={{0x14, 0x29, 0x43, 0x3489}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r6}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1f}}], 0x58}}, {{&(0x7f0000001000)={0xa, 0x4e24, 0x100000000, @mcast1, 0xfff}, 0x1c, &(0x7f00000012c0)=[{&(0x7f0000001040)="95097d995722a5a351170538d37928f7ba9385e9559c777f5546208fa7ca6719eac3e541363733656d599a92805d7ed9fb6e253b84a0c237df", 0x39}, {&(0x7f0000001080)="250b30cbfc4b9d30f5609cb653d3d217e577907e97f6e52bdd00a411d16729323608f201a08656df0b06726f9b05f09d61be866bfe2444c67e21b9bc19519b7b0645763d3ab100c25bc7a00243f8bf97015f1ec2bfaa456fe12fc1447e48960ebe03", 0x62}, {&(0x7f0000001100)="a12f956ad7a6f54d09ab7b201636da457bfa92de7123ed54ecc659bec9edbbccd08c0a11a31ad3ecb4a04b2b4275cb8680f29d2a02522c36d46f4582e724c1aa2fd517a54931b7caae6909042c2bfe32bb250d8ebe35c9339ea10f9ed461c2d0009f616ddf0d9d502b4800c94f66cd83791b2f2340a04895545228928d04a13c1972c0145aa71135b36d43ac", 0x8c}, {&(0x7f00000011c0)="c1ade2489460d5a7b53343d9037f75daac9edc742556e776ce09ca2fec641a206482496bcdbe8ffbf141bb10370e00c9d95abc9a8eb29f21a80f49622f12d5e505d26b62ea274e5dd5e3017900d13e6055545617149f8f813cfc286570bbfcf6f11e156e2c5db67c", 0x68}], 0x4, &(0x7f00000014c0)=[@hopopts={{0x90, 0x29, 0x36, {0x0, 0xe, [], [@generic={0x6, 0xc, "e68dcc019d4cdf1a75f96c09"}, @pad1, @generic={0x100, 0x12, "5e94073e7b42327a811ce1ace21df3a1be48"}, @calipso={0x7, 0x38, {0xe, 0xc, 0x5, 0x490, [0x80, 0x68c, 0x2, 0x7f, 0x3, 0x4]}}, @calipso={0x7, 0x10, {0x1380, 0x2, 0x1f, 0x8, [0x6]}}, @jumbo={0xc2, 0x4, 0xa5}]}}}, @dstopts_2292={{0xf8, 0x29, 0x4, {0xa5, 0x1c, [], [@calipso={0x7, 0x10, {0x3, 0x2, 0x1, 0x1ff, [0x3]}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x40, 0x6b, "ac9acdd018f7748f4f87f6541ccc78d7bb089daf2ae11ca18d7361e112f67a8e8a6005ba5c5f4312360631f567c89ff12c972cbfa8eb14a1991d8dbbb66f7581d67eaa39ce7b8fdbb8d7d66f23ff5e4e70a187f9418e4f0acfc81309503839c710129b47c3ab752daf5527"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x7, [0x8]}}, @calipso={0x7, 0x28, {0x5, 0x8, 0x3, 0x80, [0x7, 0x6, 0x2, 0x8]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x2, 0x2, [0x5a]}}, @jumbo={0xc2, 0x4, 0x5}]}}}], 0x188}}, {{&(0x7f0000001680)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x17}, 0x1000}, 0x1c, &(0x7f0000002280)=[{&(0x7f0000001700)="bf80e4ec5e69aac6eb7dea1ed432cadcfeba20d216d4bec656a669b2b7924701a2430d423e930247ed745bf1cfc051e71fa642ce8c5d1c3f0e5c9ed0b859e26f5c25478065cc422721d6202845103fe22ebbf735651f0d1b8e0142d4cf20586dde1767a8d50c4bd695ffed6c8b33a9016fc543effa4978014c5957", 0x7b}, {&(0x7f0000001780)="b5319f4da478ed2f4bb28ac2eb7b8bf91dc85ec4044b0b4971d510dc75a1804503df4e76cfe9459848d6aad8a4bfd1d33f2dc1d99d6e91f4fdbfb303c465d9f0e25b2c7d2b8ffc1cce6e258a22fa85b7eca293fc8bb475589b6269d20d5c7ab2d2a480efe45eb617b8482a86c092301e2ce6d62cd12d2984fe6c2e18fd32e498f16421651de8b8bb7147993bf789208e6605ca5b806530b8502f1a6c3b9dca1dcc5ed5df6fc7bef1469e57ea29f6d4c78e98803764748b4315912c18967744058064993fb83c64bbee0ffe75491aa191fe8e6694e364ffe943f48bbfb8b5c91ebdcdcb2c6386704551f2db11e4bc76", 0xef}, {&(0x7f0000001880)="b072ecf1a7f0cec1fecba9a02fb31e8611a0b0916d66f513ce1c724e4c3a3f3d28f46971f1c5ea534f39eccd972c87902a3fd7fbc599d3d1dacb39d4e5927c091144de988936c4df0269818fd4726c5cba7d8f0de413cb7c6aedd240f5b4a8b9319ba12bee4a8d6ff61eccb04a8f86b5b69c4cc4ee3c68aefeb196b8d2a86128cb5aeb1a777aecabe718eb30e73591a8ae62bc4c2b17faa2dc3f9bd500a035ed53b439d4456be4057875ab3f49646ce62b5def407e757356762d973fbf589528374e09ba7e69cfec447421db1a62ad30df4ed43156f55fcefa57beb32675ac6465a04a", 0xe3}, {&(0x7f0000001bc0)="b36bbe8aacc3a2830dbe0e4a8041cda9b02e7275dd8ce793fbbc88ebff7a5a2f0ba79944c39c4fbd873327bdb52a84a938bc355abd7961819b3e2c546e3dee8aa504706ced2aa82fa99b626f74cf3e33ed0c29706231ddd70fb64b21743c1bd3b561d31c9f08f43dff5b2179ecb3a4d40c5adff0d50dc37e74dc22fd6d8a565d1418d6c1c57d30aae64807d6148e5a39fc1731e29958aa6758e579bae8580d5f11788a735316fed588b09e9b4430b3bf5096848bd8bd0326", 0xb8}, {&(0x7f0000001c80)="4bd14d4029d6aea5a1a475c6e3fb616b7e4435f113da09909a7030f73506ffe2b61264981ad8dd29848a12f191fc16181cadc0d136b2fa72040651fa4648845cb07cfeb655618ee7f889a34c18d9cdca8288034e01004ca7b513cc520989d8198fb0b0fa1ed9ca9bae12a7aab4f2d19cf7b3be6ba1cd6392c23b9863dd56086a8b", 0x81}, {&(0x7f0000001980)="9a3b64d4cbd1017ee2e5347de591d3f8dd99a479b9878fbca6bd0f2f46d474b8812878cbe2252b509ba4dae3aea7e5816cc59073b8d9158e8521b0cd0d6a93a373960b26899005c1e204867cd28edaf04c70e235481011b86fe80f3c71470654448d4b511eaf318532f7822451b6", 0x6e}, {&(0x7f0000001d40)="30ec44c34738a97bdf99f47c34cd66779e5300061bac2f70831cd01159b5610ca6409b78e19a2a6e9d2dfd0caa337f7e83d1275c4bbac07deabc9c2f7a00a001c8d68ebf3d5cba53b9c8710337243abee299135e35ed868beff6e618fca716b0f73ecd82ce8a4381062c820457ce6e320779c153f55c31beefb43508cf2e266d7550f732edd10040dd2a1fa6b132273b8e11d7b39e55fa110d35563fbd8836ce6936bc937ff8772a474bd5c877218cac49572e267d2912c964cc5ab088a21e68b09aeea96e0dbf4c582dc6e22902148d135fd5365428d316b8486d8338ee3ddb", 0xe0}, {&(0x7f0000001e40)="e302f2865c2030daeb107d649650e04f2373b840610b4a7eb14085394251b7bcb4508d0994e943a3998dd181a7420409e3cb3c75a9d60112e130d9a273d27e43d613df2aa44da51a3e9bb01275257c0260031144fad09445119b046d7b96b5b3c1b5f62118", 0x65}, {&(0x7f0000002100)="8487885fb27a5249e1d63b3242045863b534eae38b556725eb1c3813e9df7042b7663dd1ec5e9ddf72f7946e3fe371abc73a49e1493c97143283ec9238bdd26b476c6849fe4b9fd48244df63fc56f546cc668369d9360115dd04989c42966ae5d23e73dd985c502e4636cc1050f812cd5ecbc6238cf8f1", 0x77}], 0x9, &(0x7f0000002340)=[@rthdr={{0xfffffffffffffe43, 0x29, 0x39, {0x0, 0x12, 0x1, 0x7e, 0x0, [@empty, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @local, @rand_addr="22d49fc4a7887940049736e581d46c91", @empty, @remote, @ipv4={[], [], @broadcast}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x3b, 0xa, 0x2, 0x6, 0x0, [@loopback, @local, @rand_addr="e0a029ad6fcdf24b7f0e3d4737b5bce3", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="f807d4dcd5c22f2bc978a8188cfc8358"]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x401}}], 0x128}}, {{&(0x7f0000001b00)={0xa, 0x4e22, 0x7fffffff, @remote, 0xfffffffffffffff9}, 0x1c, &(0x7f0000002980)=[{&(0x7f0000002480)="1a80b711dcf9d598839a6282de556e41984ca99706b0819c6dc749772cf915c00c22030b6ce17e55fbb9c8651a64f460ec436a7df55901e5470d6911d4d95f11deff331dc4c7f97ef1a1414c7349604bcb8b248b397d83e27a5424d5d629d2fcd07a4e167d7a16242c3af82a06ba44029f248d2250d7862b3987f136482a7e36d250599fdc3c9bd6adc8d032f3c859c066", 0x91}, {&(0x7f0000001f00)="5f75629127fa75f1affd97172f5cab1cb766668e", 0x14}, {&(0x7f0000002540)="a45669f01700c5f8c3cbcbeb19f54461b7fca8c508f09fed82db36b01b4e949c51a60cec110bcd7179dfc727476bb3af7c03e3db0ac66331e26005b489267d224d64a87d38cbb3108c779ea556d051329ab2849c23f1fcce125c3f2143ffb520ab94a8a1e2cd90298d13eeda0671250d3401222c8220c3f0f63c20ee1d4c803d6ef32e5a0bd15133bab070f31a5a69355e1ace25a9560d5ccce16dde896ea7bfe3641ebb354d10423776287d2d68d52c97b498347c", 0xb5}, {&(0x7f0000002600)="03fb7c35e91f4b408272b59cca913eba32882842506e0e8335c11aecc7ee315c4bf5bb1ef39382863cd51cadc315354daf952309015a17a2073309a55e58020d607e4447a0050593d141dd43cde33fada32e85c43154b0d7ae9563abe3e73362994127d64c9cb63b950245a91621b2520a77ffb051", 0x75}, {&(0x7f0000002680)="8cf7c81dbcc912f78f9cb366eceef32cf0809a1ac18b9bcfc28076717392817b5d17fe7e30672ab282c709f1cb4fd6b3edb74c667cc41aaa3ddf4f8ba0523dfd5861508b9b3c8e278331216b4fdabe5d8b2c08f60857e2f21bc0b5c906a9480395c9b841ccba527d53aec6ba0b0aa364fd46ed3119e3", 0x76}, {&(0x7f0000002700)="54979b1202d7385ea27aafd5b604221e304bc101c8cb580bed22d9ccc82d767cb37d18a2b169c26d7c8776a8ec944a2713077e3d0a36739e99b67ad80b58ae51a5f7a16600fc935b15342e8bc2495312778fa2faa29c631650935471ea7d8e46dd0126c1f42ada69fb14d9134831562b1e45aaf06b4ddadd68d9654a077556b271c7520fd38eec83bf807b7b677a522f4712d65e19812469545088848694265605fe458ee664e5dbed18b2491e36b88728e604ffbd4825d2c607167ff660ee7d4eb222e70fb08eaf957d54561cb19c85738f6ad934ee8ea3654d619768ae08064a5869d602893b616f0812bc6b88c55321743ef084cc96", 0xf7}, {&(0x7f0000002800)="f10c80cadff5f2531c8a5c3d3e1681e3102315b291833775db9bc72382cc06445c7d65df92350c0a523226d6ff592d19a5fa90b924b39da19a6422eed7b69cd69348f91f4efa97", 0x47}, {&(0x7f0000002880)="a640948d6cbf5fd1e6672590be8380100ec0e0f779d16a7c9c0480c93af5bd0bcfcf3318ae850fd8505f808ac313eb450d35ac4c1f97df6a520263df54609618feef829cf755a1547c64c04b6e8fbae5915acac2a06c4391b1b52ae75250143175bc885873faaee18793f4a59a4c9f4b937a3627b830e59589ccdae60ced1859af94f6ba3572eafdb358fa2fa424ffbf9d4a4590f43f9476096ebb148524e01acbaa7b866c82092ba95f3da5bab14458ca2e7abbfc89c99d583b4b45c993e7d171ff29ad66bc775937324da6fee31e6b610f2af662e85fd5", 0xd8}], 0x8}}], 0x5, 0x20000) getsockopt$inet_udp_int(r11, 0x11, 0x67, &(0x7f0000000380), &(0x7f00000008c0)=0x4) bind$inet(r10, &(0x7f00000002c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$KVM_SET_XSAVE(r8, 0x5000aea5, &(0x7f0000000940)={"a62180bf22b015fbf685d627db203b8852d806c7db3307dbb59cafcfa328d49540cbff9c2976e6d29ea14e728e1b52722eacad2ab6664310f6bbe225b5dff7cff806da04c7a277f54bb7cdd9d2d8ebc76c985e15d9d2a7c10e94756ee3313c92442dc6dff7f92cb6de83a68a725f939bbdf2730a0b6bf7f734d34d89ce051170bafcf15b9d02265b82fa9bf014cfd6f40790bfcfb643a400402bbcb00a68d3aed3e7d410c2742cce92a51996d1efb47c3c6eb925b09b5921ca2d1cefbfc074b73f7b86db4563003d9b4a1b6868e0317f2948471494ad1cc14e5db62ce6d13474e08d85a2d5f659a7572c10438dc2e860ea2319796c6550dcdc6e6abb21c0be8bc1edf5e29196ef03f55da6691325c6cea60c0012f52fbb672e1d5cd6810939e082e2912a7a78d5a240d88b868640ff68dd39eb4e97c07d08aa44e1e3fffadab2431513d2ba74e9c320047bc31d2eb1624b950a5bcd019834001b8700f1815dfba0bcf8df9f9de592071cca21ba03c91bfd97302abe4b5ac2cedd7328266ab434f0395634567afab1ddc52d174c6f7254016bb11b43f0533b8cf8b7234887ca85d68e23b474508f434bd3a6f2d8c299b9435cb3aff7ce614428413a0f5007629f7af0c6b35455bf58e168786180b3ff082d48ea41efca87e15867f596eed4633babd2a885ba4e5f6119198c30e8e25bfe1239c8d0e79f8a4178c82c39f0f47f60b9225666206b496f473e7d95b184a81e60ffade55364580530ce22214d30b7a667b29a64d64da716931fa2be02e32d5bdc5f64670fe3df7de6edfe1028f51ea2b678b05e4b57128e34264f1fbe7a99b2f69323734ce2cf7f46074b99458f585883cc542d0ce2fd8fbad64262212c0aafd4a684d413a7789b2fb6eb6d4a8f9809e7fd3359a1a51df8631c4f014479dce2e09d640c9a998af16cbfebe2f7433e6b5bdc7078bebae59ef25ad18afc344f361e35a3fc871b129ed8c04289231455dde70a3caba8238440c8cecbac6ee4a31f91edfad11e4b4cf32b2ef247679123ba041ea38844152609dcf4570a66c4c96acb6ba25ec85e4e9f8dd5c99698bc912ee6e7498a44146e1ce6925efe29a570bcce73470602798d149d632d3c55253be799e6dbf24854a1f4504c368b027fafe0eeafc62e11f30ef674494c889037570de862013a5d688b36aaf7318cd2105609c6d0f21dc39c34effc9ee170df7d055ba0ec76b4093ce5c4dded715ebe0c5dfe6484df495dc84a2cac17acc46b5b0c8c9166d1fe4ce84ab974bb3d72ad49f77643d24bca1a1eadc73c45ff4efc1e2c1ff7f4701e81835dabf6e8820811a8a58a0065373d7957efe5b9795bc30c5a30eff31615439a6dae19baa2e2fc8ded2f53741735fbf603e6531d3bf6f21623199359e821514b19fd29b958463eb7dae62526b53ae6789751b3019317a092314aa0"}) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1304.625209] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000004a, 0x43, 0x0) 08:16:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x50505755550000, 0x0) 08:16:21 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) sysfs$1(0x1, &(0x7f0000000080)='nodevnodev\x00') 08:16:21 executing program 5: r0 = eventfd(0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) clock_gettime(0x0, &(0x7f0000000040)) io_setup(0x1, &(0x7f0000000100)=0x0) io_getevents(r2, 0xe0ea, 0x1, &(0x7f0000000140)=[{}], 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r5 = socket$bt_cmtp(0x1f, 0x3, 0x5) ppoll(&(0x7f00000000c0)=[{r5, 0x10}, {r1, 0x2000}, {r0, 0x2000}], 0x1fffffd6, &(0x7f0000000000)={r3, r4+30000000}, 0x0, 0x133) 08:16:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000004b, 0x43, 0x0) 08:16:21 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{}]}) r3 = syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) pread64(r3, &(0x7f00000002c0)=""/5, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1307.245128] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:21 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000004c, 0x43, 0x0) 08:16:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x70525755550000, 0x0) 08:16:21 executing program 5: ppoll(&(0x7f0000000180)=[{}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x83f}, &(0x7f00000001c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x5}}, 0x10) 08:16:21 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_rose_SIOCADDRT(r4, 0x890b, &(0x7f00000002c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x80000000, @null, @rose={'rose', 0x0}, 0x0, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1307.493824] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:21 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:21 executing program 5: r0 = eventfd(0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x401, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={r1, 0x2e, "4e32b01a698d56953868c8fd2df52714ad7bbd680f85451544a38ca33141f82c12f607460fadda4f4a5eaeab322d"}, &(0x7f0000000140)=0x36) r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200), 0x4) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000004d, 0x43, 0x0) [ 1307.658555] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000004e, 0x43, 0x0) 08:16:21 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\xff\x00\x00\xff\xff') 08:16:22 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000000)="58d247b35eefa888fc9f5cf3038167415431f408b48f78369b4044b834e7cf20c704efadafc5f0c791b239278b4e49543b282f477f157db1085b1d07369ada6424232cf7729b86a34f770b40c97fdcee9c3cd5811563ea193fb16358b032705e37eef80700ba7e532363c68cbb66bdf86ee211ffe07b93aec081918a73d20d01c82ef8e92a191a0a8c1264ffbef796fa2932f9adc3f964e3486f38e08ad8e06e63e26472b89ada5e842139a4d1195b63a4a11ad60646030d40a843dafb3adf56bc1e61507c30d7973230568cdb630ad24c39", 0xd2) 08:16:22 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 1307.881842] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1307.923088] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x70710000000000, 0x0) 08:16:24 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0), 0x84800) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x2008001) dup3(r4, r3, 0x0) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000240)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000000), 0x40000}]) r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) io_cancel(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xb, 0x8, r6, &(0x7f00000002c0)="ea63af04d79608dcb9f9d082e25689448844c3745aa24343ac374028fd33f45a2093c9061a8bfc80792f1d7ea2b05957162140942b325694d69a60644b5fc0119c2ed7939d0952d2d557f7d7997270391e4015559aaab43303b323c47cb5073d7ab80247f75b0f0a49e91e28590d6ff12a68bf6353447c3805d6b95aab96", 0x7e, 0x3, 0x0, 0x2, r9}, &(0x7f0000000380)) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r10 = socket$inet(0x2, 0x200000002, 0x0) r11 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r11, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r11, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r11, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) setsockopt$bt_BT_RCVMTU(r11, 0x112, 0xd, &(0x7f0000000200)=0xeb, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:24 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000004f, 0x43, 0x0) 08:16:24 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:24 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x10002, 0x3, 0x1000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) 08:16:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000050, 0x43, 0x0) [ 1310.540553] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1310.585638] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:24 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0, 0x1000}], 0x1, &(0x7f00000001c0)={0x77359400}, 0x0, 0x1e1) 08:16:24 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:24 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000051, 0x43, 0x0) 08:16:25 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1310.722304] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1310.859511] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x8000a0ffffffff, 0x0) 08:16:27 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:27 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000052, 0x43, 0x0) 08:16:27 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x1ff, 0x1028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x400000000000000, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xaf73, 0x8000, 0x0, 0x4, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x246141e4ecd167ee, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f00000000c0), &(0x7f0000000200)=0x10) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) 08:16:27 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x128ce98220b84cb5, 0x40) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x3ff, 0x100000000, 0x50, 0x5, 0x9, 0x3}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x5c}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x4000, &(0x7f0000000080), 0x2, r6, 0xf}) r7 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r7}], 0x1, &(0x7f00000001c0), 0x0, 0x0) [ 1313.640604] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000053, 0x43, 0x0) [ 1313.693265] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:27 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="0a0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:28 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:28 executing program 5: r0 = eventfd(0x20000000) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:28 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') flock(0xffffffffffffffff, 0x2) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:28 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="0f0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1313.945689] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x8010a0ffffffff, 0x0) 08:16:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000054, 0x43, 0x0) 08:16:30 executing program 5: eventfd(0x0) 08:16:30 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="100000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:30 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:30 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000b80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/77, 0x4d}, {&(0x7f0000000c80)=""/139, 0x8b}, {&(0x7f0000000d40)=""/75, 0x4b}, {&(0x7f0000000dc0)=""/112, 0x70}], 0x4}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x9, 0x6, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, [@call, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x8b, &(0x7f00000004c0)=""/139, 0x40f00, 0x9d52c7a3704e453c, [], r1, 0x13, r4, 0x8, &(0x7f0000000ec0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000f00)={0x4, 0xe, 0x2, 0x5fb}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x10001, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0x5, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r5, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r7 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000002280)=ANY=[@ANYBLOB="ae00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000001db25ad670c2e523774c6d0c5791890000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000300ea000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f7570000000000000000000000000000000000000008d4eae64ec7a000000000000000800000000000000000000140000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdff"]}, 0x3b8) 08:16:31 executing program 5: r0 = eventfd(0x1) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:31 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="1b0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1316.741681] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000055, 0x43, 0x0) 08:16:31 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:31 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d0000000080100003801000070a8effdc86773c478da095019454e026b74747970650000000000000000000000000000000800000000000000000008000000000000000000000000000000706b74740000000000000000000000000000000000080000000000000000040000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000004000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000a875d72d23622db600000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff000000000000000000000000000000fe31c54011707749d043f5f8442f2bbcbbdd6d11267c8a93555bb9bf0f032bf878785daad45eaf1e5cf547861bee391c26c0dfb2bf73e6d1663dedfa3a810698ff3861f002d4ecfab549a4cdfb8d2b45b282c23ff82ecc2020e080fa3a9bdedebd02c21f8d5a3308e4cefb679045614af09bdb54de30dc2ba8ecf5e3f1c29e911bb774347448154e0a57fab048695ba19e3bc681ee049c68006e70d1be156b217e9c56b89a1e7b85bf82f7bb2b23d890a9828a009cf360ffad1ecc42bcc1ac9de54ff5ee5966"]}, 0x47d) 08:16:31 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="250000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1316.968792] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 [ 1316.993109] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x8021a0ffffffff, 0x0) 08:16:34 executing program 5: r0 = eventfd(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x2404}], 0x20000000000000c5, &(0x7f0000000000)={r1, r2+30000000}, 0x0, 0xffffffffffffff32) 08:16:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000056, 0x43, 0x0) 08:16:34 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:34 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="5f0000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:34 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946ef3b69ad579dd6c49ddd5bb6b6ce93b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f51eeb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9e40d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963186a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000b00)=[@in={0x2, 0x4e24, @rand_addr=0xd7b1}, @in6={0xa, 0x4e23, 0x4, @empty, 0xffffffffffffffff}, @in6={0xa, 0x4e23, 0xf4, @rand_addr="b408b3f638d09939a02151b7dd5cb61c", 0x8001}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000}, @in6={0xa, 0x4e22, 0x10001, @rand_addr="1abaeeaa63bda91c1464009ccf16fde4", 0x1000000000000}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x1, @mcast1, 0x7fffffff}, @in6={0xa, 0x4e22, 0x7, @mcast2, 0x2}, @in={0x2, 0x4e20, @multicast1}], 0xe8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xfffffffffffffc83) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) getgid() setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1319.797539] netlink: 55 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1319.808633] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:34 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:34 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="230200001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000057, 0x43, 0x0) 08:16:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_int(r0, 0x1, 0x5970afacef85b173, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r1 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x7f2, 0x80000) fsync(r1) r2 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r2}], 0x1, &(0x7f00000001c0), 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x400000, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, 0x0, 0xdfae, 0x2, 0x10}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000380)={r6, @in6={{0xa, 0x4e23, 0x400, @empty, 0x1c}}}, &(0x7f0000000440)=0x84) r7 = accept$alg(r4, 0x0, 0x0) r8 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r8, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r8, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r8, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) setsockopt$inet_sctp6_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f0000000200)={0x8, 0x7, 0x40, 0x2}, 0x8) r9 = dup(r7) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$RNDGETENTCNT(r9, 0x80045200, &(0x7f0000000100)) 08:16:34 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r3 = dup3(r0, r2, 0x80000) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000008c0)={{0x5, 0x0, 0xfffffffffffff6bf, 0xf8fa, 'syz1\x00'}, 0x3, 0x0, 0x7, r4, 0x6, 0x4, 'syz1\x00', &(0x7f00000002c0)=['./cgroup\x00', 'vmnet0,&selinux.cpusetwlan0vboxnet0\x00', './cgroup\x00', '!\x00', '\x00', '&vboxnet1GPLproc[vboxnet0security-\x00'], 0x5c, [], [0x100000001, 0x80000000, 0xd7d, 0x3]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r5, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r7 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1319.986080] netlink: 507 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1319.987480] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:34 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="1f0600001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1320.110841] netlink: 1527 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xe0700000000000, 0x0) 08:16:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000058, 0x43, 0x0) 08:16:37 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000000f008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:37 executing program 5: r0 = eventfd(0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x100, 0x0) write$capi20(r1, &(0x7f00000000c0)={0x10, 0x9, 0xb4a6beae5eb07fb5, 0x82, 0xaf81, 0x1}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400480, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040)=0x9, 0x4) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:37 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f00000000c0)={0x1, 0x0, 0x2, 0x11600}) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r7 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 1322.861710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=10753 comm=syz-executor.4 [ 1322.883590] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:37 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x1008, 0x0, "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"}, &(0x7f0000000080), 0x1000) 08:16:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xf0500000000000, 0x0) 08:16:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000059, 0x43, 0x0) 08:16:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 1323.001756] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:37 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='s9zkaller\x02', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10000}, 0x10}, 0x70) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x80000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r4, 0xffffffffffffffff, 0x8000000000d}, 0xe) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000340)) syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000200)=0x3, 0x4) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)=0x3f, 0x4) r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:37 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040)={0x2, 0xfffffffffffffff7}, 0x2) 08:16:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x100000000000000, 0x0) 08:16:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000005a, 0x43, 0x0) 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000012008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1323.350718] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000013008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x200000000000000, 0x0) 08:16:37 executing program 0: mknod$loop(0x0, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000005b, 0x43, 0x0) 08:16:37 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x5, 0x100, 0x7}) 08:16:37 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$RNDGETENTCNT(r5, 0x80045200, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000014008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:37 executing program 0: mknod$loop(0x0, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000005c, 0x43, 0x0) 08:16:37 executing program 5: r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x259) 08:16:37 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000015008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:38 executing program 0: mknod$loop(0x0, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:38 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x178, 0x10, &(0x7f00000000c0)}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x8000000000000000, 0x0) 08:16:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000005d, 0x43, 0x0) 08:16:40 executing program 5: r0 = eventfd(0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x284003, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x16) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:40 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000016008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:40 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:40 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) ioctl$TIOCSTI(r3, 0x5412, 0xfffffffffffff499) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:40 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000018008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1326.595308] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000005e, 0x43, 0x0) 08:16:40 executing program 5: r0 = eventfd(0x204) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:40 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:40 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$UI_DEV_CREATE(r3, 0x5501) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f00000001c0)) ptrace$cont(0x26, r5, 0x8, 0x4) 08:16:41 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000019008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1326.834321] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xfcefffffff7f0000, 0x0) 08:16:43 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000005f, 0x43, 0x0) 08:16:43 executing program 5: eventfd(0x0) socket$rxrpc(0x21, 0x2, 0x2) clock_gettime(0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000100), 0x20000000000000fa, &(0x7f0000000240), 0x0, 0xfffffefa) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000000c0)=0x3) 08:16:43 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001a008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:43 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000001700)={0x1, 0x0, 0x2080, {0x100000, 0x0, 0xfa4ba11f76e453a}, [], "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", "c02981f55161e4fd4d7a089c6c79da894d00e6feef9b113727b7aada58066387af1dd329d5670d2b40863c83c2e2abca0d551ca79119bec3c788d6a62cced95362cbf3f582eff2865384df17a35cae22f2aeaf440be8eb26e662fe88254b7d3bbdd1620f2f759193fb0e1a73dd61be5c8df29695ec11d7f0205e0641762bb18a314ebc6c4e181fbf403a0b9d4c24fe0c46bc074f1b5f40db334d42bd483189c8ecc268650ef40282a8313f0eef284d00327f3b45cf27c837c81b497c93b1fa4b509bfa6dad374be670e1f30a2006111b19c728889eec5661079deac84cfb3b9de1c4ba376b798a4af8e5b6695b5fe06cd5d6e6799e2d02f8f4db03c89b11d7b1d7e7a2c1d57830f081ce419fa1c0cdd9d59c22c7a96bf940f5c6c08a1c8429d8f71a35c07f3df6a467148bd23065a764a2809a5075ff38b83b8bd3d1d98c670871dfbee9a59f020a992b9a1989971a7cf6f54ac9f42684d92f2a7f7138107d0280e34ddac482f1e89252f454a7710a9908fcba0d51ccdd0ca880c60e5acd437a03cd7082ba8ab29bd4c7eb98f23e41aaf324d6ebe6caa4b049ebf00d58c5e8cc1d8e22df4741f0e9688cea562805a93fc8f42c415668cb54161b8fba6a5c2316665e4fa153f1c1623aab4e24afb33fe8133da7694dc1a886b35776d138bc4ced3af43ba5382b0d7c9a3483aa52fa5164c4e919962a678c0eec31182488d2e57f292e3c855251494889a5e5a9ceaa0961a43bdf0646876b9395354206d11952cc53bd92a31ac81032c25f4fe22656b6f41948ba4be72d29b80d6e67330f8301075702186fd02ba44f2687465e1ad67391cfe03055a330e81914d0f9e7271a50dba677ea9c2ad824d15338c7ebea129aca0266e13d75d6ba19a03c2d4c5a0bf8bab6db2690755ff81d93e40389f1059850cf2075029c784d7a23aa6d1866cc91a375e61958dbd951f8352903936907e7da7bccd32dc83368d64b661410a1a64167102a045bb7e7fbc762318f6c1c29b9b008fcf43cb32be1e2c041ecc44f613e7036cfaaf6826c81e8c0bff4c3f536c892aa42435704790640caddf1cbdcdbc23e272d4f288b2cea35402b3f074dd6d217ff65740cac1a891164d221785bc8f55afc9fa98d3d926ddc758940620ce3356c937c46308f702918d0ac289bde61f397b9d38026c47277229ec3d7c392f0f0d7dd3e7bb79dd324992a2950e170f2884a7871a206ced42069e856709aa8f5f32677c83f94082419199714c2e46f14eb91e43826617b6c7a212d2c0f5eb2026f9b3a512c9b8fad1833a867b6dc15590e092f8e0a1aa19e83e7a5bec4f7b081498899c0b00d7f5fb28023b49a3ba4e60968bec8a797b0b91cfa2940bbbc81ac3f4964cb38562894f4a4472940e93a5fa4bd7e797faec765c6b5a9acd9df02910b31940cbb90c1271dcbd4b0cc4c88dd03e521cc218b98f4626fcdb5331ad1861b8a33536fa59156800050d0e6aa6470ec38764f07c8fd6e7dc3bdb2f6d12c9ab10998a408f64fe5182033ec5a781f58d06f61cf217f5c9dedc44c53577b962fc6b881d36aaa8d51816453b6e85f95786f190619c3ce09e61bae3e10d21e8c7a532c865877e88d3968b59f2a5c41b3fbc147e40a6c595c1857db78e7f6e93b260905da9f830e8ea425889095601ee2b309c79d53c0fcc734fc3ebbefc6d0b388ebddea60e4ad4b8ab897b79ea6ec11015cef00835cdbe6a33005b8eb9f854d3eb10ccfa0061d6d6bd3bc37578d16c77a66f6248a5badb521b288884ab332efd3af74ddf37b1b2715e0ea6017c43fab94348018ad65976a121f52f5d744365370b87eb2f4fae9bf01cbaed6e1c6d5c012ed2bb538af268d8d1de332e03d02d41e21f4356a8bbaf3de513d04aa7646326a0ae8d8429a8b62d1ced9e027af50afe7eb7ab1a52626f862ddb8a23e1e3357586eeee6d0fcf5d77786c28f93be3536678f6f7f7a2570e992f87f805f892ee782d450cc2fe6b57bfa15dd3fdf8d6924e86854c42a3afbca86312788a183d44b2fbdc2d85ac5478106c6c44b6858f20ed28be705190a5dd0ecce27670bd036c23cd3634e8c66b2826cf4a0ed27394fe10527d4b83f1864ff00bcc81a7bd00f9a39d09644f5018189e88c01e946b63f183715a0475026eb5acd545aef3e27c88bfddcdf02e80e1dbaaafc85a9250f75c0f41ccd40c8bbe5f61c9343069012e91d5dd87647598caaa3dbfcf4ee919e4881005c52f6ed8ed8ba8231640d72c9786178db9f6eb4195320ba94fae9de8979d73d9b9ef594d35cb2809ca389ac74372db3cd0c46d330bf1b5bd1ab6dd559f0ba72e3a14156768d4b5878d792763d23a622a005be864223df6756b5327730b5c8998b6cf4d526359b931b49ca9958acc2f558c924e6aa9699b84a7e7adf1c190411e83e9643045398036a1a7b34c8ed6a7eec9100c8e81343eb9a0c383a2a5db116695abcc675f4ebea2293cb4a69ed4ba24d0bde2499757d57db35af10640b35a43eab35c7049026af701d96496598f322feb3f4074dee20570c0f4ab60fda5176dbc640e69659a77242b4234f1120761de41d519da3a28827224c2ea6156028ce69a7164e76fa157697334c7ca865c2e8f680dd529a43f96d0abaafc0a4b94b11ecb993e9d0406800a4f512ae1d350d0cbeb34c5b2b3d6ed2d2927acee2c8a8e632800041bdefc0e70aa78c34ab1a03a89d99d9f17c031a693caab7d0781141c816d6704a40360230a45b5fa9be631fd28164af8f6089066a6cfb7179e90794ad6f0a6e4a0da3f97770edbc991374727200cf0e9238dcca1fc5faad3969fe55faed6b0c2639d2a63b6b1b6cc16812df8666358aa27cf0ef01c8617359b38ed6b3f71236192063fbae7e64d632e4af3af3671705fb0f8697ed74bc86ee3c736b7e0903ccfe641ddaee7f731b1aedd21725da2a53a79818c69b1330db5d9ff2269ef19d5c6901a3a244f03cc7feb5b099f965ae9d17d000e2a277807902bbc09cd8893dd1033ef5114ec8faf9d68930b727f1efa1a1078aeb64854d1b2123de2a2adaff7c0740225a0215d9228cb7ff25805c7ad98deb61cbbcdcf8392b7c2c1a5ffa948668c937854bcd491c8148da8a1c67848b899d60f0972b8e39e92296a0bb7077f882eb1309a30df6a7e6b117bb62bab6de9f0a29feca22dec21689cde655144125851f843443f65870eb5c1020f5ffacf14e4a1939fdf19d929d7730ab6bf25b0ab0d818840a4b92facb0676832e7c1bf8e0b0b91c462cf943f34ce9c12231fd5a0a4ea8890107eff04fdba7f2581009ccb512a80975fbb7ae45789ee8807f97f1c89b8402e82fde7a444aea9573aad0c2f5df7efb7e7aa04d2c0aeb54d8a49b75a2a8f6b053c00ecade9bafe29b8b7d451ff25e4d1d5e12b008b1daa692ee32d538fbaefd2d18a99d2c4299fb0f472c9c20a9c9497d4f447f37eddfce8f2872c8508701d762f02875e1903e1411e0d7e721acc3a490057c0ac13a93ec77d6fb6e5bca0561958c3e3c571e30a25f6ebdd323bf5ae5db3587c48aae59fdede2bbf79b8fca100872af126d308d7684eeee33a18839ed70edad28e9fc9ed837cb6ff632854c4add595046510097032dcfa1eb6a39df82f005bc0be4d39a23f339eb650683a9308c33e9935767be5bc1f1408f93e619c74efcb5285a4d30a1e0c31c300687b9e474906778175757244fb50a396db98a86ca49a2372ed2209e8c85e0e9e359da2c7ae250d332db44debbf0a99684283fe4240f46fc0652062deb9e587baa3dcd4ccc91792d9ddbc80081bd41d96e50c14a105ef4063c1f6838ecaca4959dc34c0e3aba164235e787d9343dc58a985169a44fe3692a30a12d169d4eb2db2516bd116c8aff5393f1f2bbde66789c75e5b56ae6e3a75f6035485b7c5eebc41345195dfbb457147c8ad4d95a67bc48e3fc5a87ec01abda8e9a4bec70197556fdd90e84bbba0a2f70c487bb40bc57f9939376e3756c923a69e7a15274a4c723d77d428390e6ada2bdfb8efddeaa178a6f2f8274536bf6ff1d254d136f0317c5ae171b5cbda76da0856a6e26a18cb56b7a1fc1b6d5122304f04703c217abc0bb12853d95d15c446e3da4564e1ba77ec1999d7621597326441f1b9d6710b84bb4e42cb141ec13ff95d8ad455e3ef56a0d8e534642478440bfa53cc4488018ae0975f253a979efd8395027b4dce2bd6e9a751cbfca88da07434c203b5f7dcfb268338e01bd645dad48c5e084c8a21a94d1cd8364db6f7e3a07056e9885a9113bb09724e2e3839080d4a1fa3157a3a8fb0b6edc8f96ac3f348f015c596302cc2f0dcfe5d4bd7715768c6bcdaf5ccc48009602c07d9e8a38c4cb6a03b1fe913b2bb2c399f40c70b4a9e9589a8a01c13178ebe332631eb818ab385116f97ce099a1b31a3a408be6027d642faa9bd2025e36b84ee8048c4a6bcf569d2443a6f21182e7f1c7699f1026597405874b3092b9972af4f1082d9b8e682841d8c84988060c844542ce035542067dabdd775e595047de9bfef4003da13c5ae3094e25225a2671954737bbd2affd5717fc6114fe8a521bc300781df31c26060c70c54062c3a652f4504939acd8ae3a1f91fff74f27663790727325ccab5ab39bcc0d6f66fa963e0e9ad0306de8abd8e3cd6e1a42eaeaaa00586ef2417796bdf30a321e04473e99cfbaebca51c381697788358da0c757c85e398a24a0e13fa72e98e44daa7e2325adc0d1ea28898b58bc5cbe90640ad8a0977904dbef1813091fa1f5065facf68b31fc8f5ed3102c28c325f053e49ce185af74c22c8c91dc0cfe7a960ceb77b433915c6dbf46549a3f1b24df8463490a167a67aadf0ba260c35ca6d9bfd559dd6fa83774981449312524d0d6a6f39f917cb4c7b7216e4b4123a2f9f1e7627016f6f5b65ab2a7ab42c2c4512ff0b1d7c6a19056fe0dcef6b4ed9e1abf78bfbe4564a100954a7a378a64ab62bfe1e7e0843fef6a71a2acd21ccd55bcf90faf9adb4a6442b45f39cc413261e02a4c65d108249155dd18b4ada85014a716ee32f0f4609c5302e8e21ab0e7e5a8e614db73e1b4b58e8573a45806ce8ab3e8b25d532f8a565ff6ef824e2a0587b26086683f50f1a9119b4169639190c755e168a1a0ba6fc57a5d876b70ecb50450f998af5bb76568c0933b9d07a02e841c88f21f14aab06b84313a41031e47daaed66354ec0eb6f40ffaf7f80b200443cc2271bf8efbceb06f731a93b58cb95de6a79bf14d45c0a10c562db0c081823c1d4db63f9552abb7f4529d23ecaf71cd3ecbf445992964defa42a51d7601dfe608f8220134bfb768faf50e34276bb974ea4b513157e93a56a92e30d8e25fcb3d73ab47e7f465c982bd6dc6e4b350c8abcd1b5260f67976495942f2007626243caf054da68b429d6cc910b0c7b104bf4d75bb1579850bb7601571f5040821bd58abe849d881c5d504fec7314c5293256089aa38d9c38bc0fdc985c39adc02c5d19522c780ff7d5f8c7942082a143c745e356f23528c4abbc8336d9ffe022ee0c0376efde0eef4871f538ae5fe1f7017b7baaa29ba77dc08e9f5a8d21c81ab4ce0befb81e17812bb76c5f923818363dd61025c877b982f9347b44a6332a7bfac5a52ed0748e7d976bd316a293edde845a72c703153201b02207a21df2e00f8aeeb644bb76bf9cdbac14bba89f9b8b61d03c68c5b6c0b4b3a1e12d901b195eac7604ea920ab0fc69272ca4143790a08839c13199fe778711a9139dedb1226d7f3c19cb47dc376ed6e2da40bea9d4238eb766ba0b6246d2c"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x12, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/400], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:43 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1329.694657] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000060, 0x43, 0x0) 08:16:44 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:44 executing program 5: r0 = eventfd(0x0) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000000)={0x5, 0x0, @start={0x100000000}}) ppoll(&(0x7f0000000180)=[{r0, 0x8}], 0x1, &(0x7f00000001c0), 0x0, 0x0) [ 1329.848467] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1329.885760] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:44 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0200001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:44 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x2, 0x3}, 0xc) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) [ 1330.021317] netlink: 518 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xfeffffff00000000, 0x0) 08:16:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000061, 0x43, 0x0) 08:16:46 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:46 executing program 5: vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="75bc9a2fcf8bc6708c44baa4c3213661a57cd5207287", 0x16}, {&(0x7f0000000040)="9b159a512e53d8f655ca03477211e78dd6266a5fa5ffd581d31dd05ade8108ebf1d1ed18647439157c7d53eed96213d6e54710d11492ccf710d211e2e3d0c2399b", 0x41}, {&(0x7f00000000c0)="60b09f3c6df35b64c292c309c1fc31d43b666f3a7db014d2e6021420ec5c878e419de897338575d19b809b543c51fbd6f8b93c09c10630b59af75d96358c92e0aea807d05a13bd4e162528399c99fd4930565f5c22ff000ec2244f9fff014dbf15eac659c1501359136caab8990a7f565a9fbc18142a5c869f3b7579d07ac8e1619ed9b5770d6aba7ccb6c92a459ece7f8a42e", 0x93}, {&(0x7f0000000200)}, {&(0x7f0000000240)="74728fa1efd661cdb7e98fb96744506b36865ce3c23b062489c902323331c68a1406e99f6aa2f8972988d62dcae8e0619cb1894ba97b6c6b9a0446db558b24335021027eae3edaffcc0c", 0x4a}], 0x5, 0x1) r0 = eventfd(0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 08:16:46 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0300001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:46 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', r3}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'ip6gre0\x00', r4}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff60, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x25a, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fc0), 0x1}, 0x82, 0xfffffffffd}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r5, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x8000000000d}, 0xe) r7 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) fcntl$setlease(r7, 0x400, 0xc1ad69ad59489ae7) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r8 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]}, 0x3ad) recvmmsg(0xffffffffffffffff, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f00000002c0)=""/95, 0x5f}, {&(0x7f0000000340)=""/94, 0x5e}, {&(0x7f0000000c00)=""/165, 0xa5}, {&(0x7f0000000cc0)=""/179, 0xb3}, {&(0x7f0000000d80)=""/76, 0x4c}, {&(0x7f0000000e00)=""/113, 0x71}], 0x6, &(0x7f0000000f00)=""/21, 0x15}, 0x5}], 0x1, 0x21, &(0x7f0000000f80)={0x0, 0x1c9c380}) [ 1332.738697] netlink: 774 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1332.753705] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0400001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000062, 0x43, 0x0) 08:16:47 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:47 executing program 5: r0 = eventfd(0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x224000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="600dff8121c787b3f76df8fabdab5f1515e7d0f48718fb25c109436170fcd62156ac0e723ed44f9b6ade4aa04a627633e5010087d602cd3fc8328281e9935ac5da8ff752e94c4ae8e23a8771c3665465ea060e7585cdf99f5a3b20cd07de2f988448f76a9e3be53a110a1e6f72065724689697ae2027fc34498aca8c36f8ea3500b4301eb6006fd3d04a0f9ba8", @ANYRES16=r2, @ANYBLOB="040028bd7000fcdbdf25050000005c00030008000500e000000208000500ac14141a08000500ffffffff1400060000000000000000000000000000000001080007004e210000080004000101000008000800ff000000140002006261746164763000000000000000000008000400ef00000008000400cce7000008000600200000000c00010008000200000000002c00020008000600ff03000008000900ffffff7f08000500ff07000008000900000000800800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000000)=0xb3, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100000, 0x0) [ 1332.902735] netlink: 1030 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1332.922882] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0500001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000063, 0x43, 0x0) [ 1332.954148] protocol 88fb is buggy, dev hsr_slave_0 [ 1332.959313] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.064375] netlink: 1286 bytes leftover after parsing attributes in process `syz-executor.4'. 08:16:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffefffffff7f0000, 0x0) 08:16:49 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:49 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000001c0)={r4, 0x1, 0x6, @remote}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xf, 0x4, &(0x7f00000000c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x97}, @ldst={0x1, 0x3, 0x2, 0x7, 0x1, 0x0, 0xffffffffffffffe2}, @generic={0x2, 0x9, 0x5, 0x1, 0x3}], &(0x7f0000000200)='syzkaller\x00', 0x7, 0xa, &(0x7f00000002c0)=""/10, 0x40f00, 0x0, [], r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x10, 0xffffffffffffff7f, 0x64}, 0x10}, 0x70) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r5 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000064, 0x43, 0x0) 08:16:49 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0600001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:49 executing program 5: eventfd(0x5) ppoll(&(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x77359400}, 0x0, 0x0) 08:16:50 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0700001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000065, 0x43, 0x0) [ 1335.822417] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:50 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:50 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0a00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:50 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xffffffffffffff91, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffda1}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1336.000549] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000066, 0x43, 0x0) 08:16:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffff00000000, 0x0) 08:16:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0c00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000067, 0x43, 0x0) 08:16:53 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f00000001c0)) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) kcmp(r3, 0xffffffffffffffff, 0x6, r0, r4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r7 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0)="fb6175ad7856d75ff0e74630f60d74e5899ab3c0961e352407fb77c2ffc639da0ec872f5f3454788ae08a1b0f8e31e88e90528b0ffd22176c5f2cc09c6b2aa97b8b7fa8bae345987b73dcf2d690af16146d889a1904df698b54f700870d481608290138a202a5c5ec5c514e5fda99205bacdb3375df912978038412b1523e616e877457b1ed267ee3ee9ce37d5db62a186b9576b276d956ceed353b19f59761cc9c8d96c52046ea0322a21ce0a33f87cfb2b58d323e794737bf56768053c70da59b245fee4cd107ed6e840c4257977e75a81f7f04610e172eeb2e395ed60577208295e9adaa678ebaf4f29054f4a8c24b5eea11bed16", 0xf6, r7}, 0x68) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r6, 0x0, 0x0) r9 = dup(r8) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$EVIOCGKEYCODE_V2(r12, 0x80284504, &(0x7f0000002280)=""/4096) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) write$P9_RGETLOCK(r9, &(0x7f00000000c0)={0x1e, 0x37, 0x2, {0x0, 0x3, 0xfffffffffffffff7}}, 0x1e) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000200)={0x9, 0x8}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r2, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r13 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r13, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]}, 0x44e) 08:16:53 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x341840, 0x0) r0 = eventfd(0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f00000001c0)) wait4(r1, &(0x7f0000000040), 0x4, &(0x7f0000000080)) ppoll(&(0x7f0000000180)=[{r0}], 0x0, &(0x7f00000001c0), 0x0, 0x38d) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xf443, 0x2000) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000200)={0x0, 0xb, 0x100, 0x1, 0x31}) 08:16:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0e00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1338.911517] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000068, 0x43, 0x0) 08:16:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0008000, 0x0) 08:16:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:53 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='gfs2meta\x00', 0x0, 0x0) 08:16:53 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0f00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0010000, 0x0) [ 1339.158978] gfs2: gfs2 mount does not exist [ 1339.165242] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000069, 0x43, 0x0) 08:16:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e1000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:53 executing program 5: 08:16:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000006a, 0x43, 0x0) 08:16:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e4800001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:53 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) [ 1339.425010] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:53 executing program 5: 08:16:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e4c00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000006b, 0x43, 0x0) [ 1339.671474] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:16:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0020000, 0x0) 08:16:56 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 08:16:56 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:56 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e6000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:56 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1, 0x10000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f00000002c0)={{0x4c39bced, 0x10000, 0x1, 0x7, 0x5, 0x7}, 0x8000000000, 0x645, 0x7, 0x4, 0x9, "28419ad1ae4f47e7f5c3bf7cace03e62f8f4c9041fcea8eba0e6f25911aba7008e18bb218ef0784f0b3a170535fa011e364a510d4a4e0e7f40ee3af0ce560af7376c01f40b214baae716a131b29ebf894c08f20f6230459b4c4f25fd2f57d6b93edcd02d109e777ab3a12c3618dbee8cbde0b3c92e76b69a9f7d72c41c30b7f0"}) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000546e9fe21ac6dd7c00000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) 08:16:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000006c, 0x43, 0x0) 08:16:56 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e6800001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:56 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:56 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000006d, 0x43, 0x0) 08:16:56 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e6c00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:56 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x55, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04999923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8a47e0e6e29dca68d16a70d94ec90cd4fbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735d50a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a7a75ee64e4b8ffab16b996517d7a2ff50fa5450bc9f0c852c49961ff669e5d065b1c7084ecdd849acdd7a971f64354649a2c5c600ed3fe38610057cdf899410bf56ad8ca73bc5cf12dc8ae922a7cc5250f36e01706290640f0a7b650c2bc6d332f3a73f5746959c00ac8a55db4c5a08fd6566404b7d030ac3ebc7b49200050883c4759420c778f3b1f7ba9ace7132ce0697f0000000000000000136dcb12c22f54bd0d6140345cac97ad6378c27f0d60fbab55843060e40074741eae0ba3b6bd9f67be275495b6692c1c062325a4fce88e061eebacdfa0edc816fb5261171eb03e9fa20ff6b0982c2c872fdc61034550333c100d30f9cfb68cd61c8092023f957617a14f12609f741064ff9e60a521a2b29af4333948"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r3, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) setsockopt$inet6_udp_int(r3, 0x11, 0x877ac7cca8d1f3ba, &(0x7f00000000c0)=0x81, 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0040000, 0x0) 08:16:59 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e7400001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000006e, 0x43, 0x0) 08:16:59 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x10000039a) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:16:59 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffff7c) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') sysfs$2(0x2, 0x0, &(0x7f00000000c0)=""/20) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:59 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', 0x0, &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:16:59 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e7a00001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:16:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000006f, 0x43, 0x0) 08:16:59 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="860f4c0e57c99ca0ad78349f5803fd3a1a6d5cb848ca6b3a3206a6bc000023b3483f5492d0616e6600df2b1e1a85f73de44b"], 0x1}}, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)) 08:16:59 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:16:59 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2ef000001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1347.431465] audit: type=1400 audit(1569053821.654:212): avc: denied { map } for pid=14595 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 08:17:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0080000, 0x0) 08:17:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000070, 0x43, 0x0) 08:17:02 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', 0x0, &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:17:02 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0003001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:02 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x555841, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:02 executing program 5: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) r1 = shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) shmctl$IPC_RMID(r0, 0x0) mmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) shmdt(r1) 08:17:02 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0005001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1348.473139] audit: type=1400 audit(1569053822.694:213): avc: denied { map } for pid=14597 comm="syz-executor.5" path="/dev/zero" dev="devtmpfs" ino=1045 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file permissive=1 08:17:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0108000, 0x0) 08:17:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000071, 0x43, 0x0) 08:17:02 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', 0x0, &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:17:02 executing program 5: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2000000000000100, 0x0, 0x4, 0x114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:17:02 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2eef05001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:02 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 08:17:03 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r4 = socket$inet_dccp(0x2, 0x6, 0x0) sendto$inet(r4, &(0x7f00000002c0)="674d3d55c2ae2b15d0e4992cce5893170b6e105b41ea3d5f455cb3a8f8f1db0613d74f94a0cf7a169fc9a0ee08d6a489a472114fcae17db1c8f2884f2b43e43fddb220a2a0b0c827768e4c2a40061c59f796ff704ae99960b0e40a4cc6bda5ad2e449c5ae213b0d1a462e987a4d1dd", 0x6f, 0x4801, &(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 08:17:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0xffffffffa0218000, 0x0) 08:17:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000072, 0x43, 0x0) 08:17:03 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) 08:17:03 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0006001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:03 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 08:17:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x2) 08:17:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000073, 0x43, 0x0) 08:17:03 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0007001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:03 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 08:17:03 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 08:17:03 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) dup3(r1, r1, 0x80000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) getgroups(0x4, &(0x7f00000000c0)=[0xee01, 0xffffffffffffffff, r3, r4]) setgroups(0x2, &(0x7f0000000200)=[0xffffffffffffffff, r5]) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000074, 0x43, 0x0) 08:17:03 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000a001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:03 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) lsetxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='seSMACK64IPIN\x00N\x1a\xd1\xf8\x1a\x00\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) getpriority(0x0, r2) wait4(r2, 0x0, 0x8000000d, 0x0) tkill(r1, 0x23) socket$inet_udplite(0x2, 0x2, 0x88) 08:17:03 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 08:17:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000075, 0x43, 0x0) 08:17:03 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) 08:17:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x1a0) 08:17:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000c001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000052001f0014f9f407000904000a00071008000100ffffffff0800000000000000", 0x283) 08:17:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000076, 0x43, 0x0) 08:17:06 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 08:17:06 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000e001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000077, 0x43, 0x0) 08:17:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x2a0) 08:17:06 executing program 0: capset(0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r1, r1, &(0x7f0000000180)=0x74000000, 0x5) 08:17:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000f001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:06 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 08:17:06 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f00000001c0)) syz_open_procfs(r2, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) 08:17:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000078, 0x43, 0x0) 08:17:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e6113001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)) 08:17:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0020001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000079, 0x43, 0x0) 08:17:06 executing program 5: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) pipe(&(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2000000000000100, 0x0, 0x4, 0x114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:17:07 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x4a0) 08:17:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0048001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000007a, 0x43, 0x0) 08:17:09 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 08:17:09 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x4b73dbd166473d56}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:09 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[{0x10}], 0x10}}], 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000001080)=""/246) 08:17:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e004c001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000007b, 0x43, 0x0) 08:17:09 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f00000002c0)={{0x0, @addr=0xffffffff}, "1b4aa06ae44a253466308d26b5b84348f8c7ea6bd7b6ab165a0b71f8d88d4d7e", 0x4}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8140, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) 08:17:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e6558001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000007c, 0x43, 0x0) 08:17:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fcntl$setstatus(r0, 0x4, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967", 0xa, 0x0, 0x0, 0x0) 08:17:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8a0) 08:17:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c9, &(0x7f00000002c0)) 08:17:12 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0060001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000007d, 0x43, 0x0) 08:17:12 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0xef3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0xc8}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2000}, 0x10}, 0x70) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$RNDGETENTCNT(r7, 0x80045200, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r4, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000240)) r10 = socket$vsock_dgram(0x28, 0x2, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r12 = accept$alg(r11, 0x0, 0x0) r13 = dup(r12) write$UHID_DESTROY(r13, &(0x7f0000000080), 0xfff2) recvmmsg(r13, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$TCSETXW(r13, 0x5435, &(0x7f0000000340)={0x2, 0xffffffffffffffc1, [0x4, 0x10001, 0x1, 0x3, 0x3], 0x7}) ioctl$sock_TIOCINQ(r10, 0x541b, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="860f4c0e57c99ca0ad78349f5803fd3a1a6d5cb848ca6b3a3206a6bc000023b3483f5492d0616e6600df2b1e1a85f73de44b"], 0x1}}, 0x0) 08:17:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000007e, 0x43, 0x0) 08:17:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c9, &(0x7f00000002c0)) 08:17:12 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e1361001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x4000) 08:17:13 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 08:17:13 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000300)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x800, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]}, 0x3b0) 08:17:13 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e5865001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:13 executing program 0: 08:17:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000082, 0x43, 0x0) 08:17:13 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0068001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:13 executing program 0: 08:17:13 executing program 5: 08:17:13 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4280, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x84000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r1}) mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r4, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r2, &(0x7f0000000040)='mountstats\x00') r5 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:13 executing program 0: 08:17:13 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e006c001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:16 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000083, 0x43, 0x0) 08:17:16 executing program 5: 08:17:16 executing program 0: 08:17:16 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0074001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x7600) 08:17:16 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) recvfrom(r3, &(0x7f0000001700)=""/4096, 0x1000, 0x670be1aae5e8b296, &(0x7f00000002c0)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null]}, 0x80) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 08:17:16 executing program 0: 08:17:16 executing program 5: 08:17:16 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e007a001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:16 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000084, 0x43, 0x0) 08:17:16 executing program 0: 08:17:16 executing program 5: 08:17:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x9600) 08:17:16 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]}, 0x3ba) 08:17:16 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0081001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:16 executing program 0: 08:17:16 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000085, 0x43, 0x0) 08:17:16 executing program 5: 08:17:16 executing program 0: 08:17:16 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e05ef001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:16 executing program 5: 08:17:16 executing program 0: 08:17:16 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000086, 0x43, 0x0) 08:17:16 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00f0001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:19 executing program 5: 08:17:19 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1ea, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x34, &(0x7f0000000200)=""/55, &(0x7f00000002c0)=0x37) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:19 executing program 0: 08:17:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000087, 0x43, 0x0) 08:17:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x400000) 08:17:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000005f008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1365.209487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pig=17577 comm=syz-executor.4 08:17:19 executing program 5: 08:17:19 executing program 0: 08:17:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000088, 0x43, 0x0) 08:17:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000067008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x50f000) 08:17:19 executing program 0: 08:17:19 executing program 5: 08:17:19 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1365.420921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=17700 comm=syz-executor.4 08:17:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000089, 0x43, 0x0) 08:17:19 executing program 0: 08:17:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0002001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:19 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f00000000c0)=0x2, 0x4) 08:17:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000500)="ff", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) 08:17:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0003001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000008a, 0x43, 0x0) 08:17:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x833ae7d8ffb72050, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x688, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x16}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000200)={0x7dd9014f3dbd8887, 0x0, 0x103, 0x4, {0x100, 0x4, 0x101, 0xff}}) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]}, 0x3b8) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000000c0)=@generic={0x2, 0x7, 0x4}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r6, r5, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r6, r2, 0x2, 0x3}, 0xb) syz_open_procfs(r3, &(0x7f0000000040)='mountstats\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r9, &(0x7f0000000380)={0x12, 0x10, 0xfa00, {&(0x7f00000002c0), r10, r2}}, 0x18) r11 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r11, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 1365.750142] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 08:17:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x707100) 08:17:22 executing program 5: 08:17:22 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0004001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000008b, 0x43, 0x0) 08:17:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000500)="ff", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) 08:17:22 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r2, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) recvmsg$kcm(r2, &(0x7f0000000ec0)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000200)=""/33, 0x21}, {&(0x7f00000008c0)=""/152, 0x98}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000000980)=""/230, 0xe6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000380)=""/57, 0x39}, {&(0x7f0000000a80)=""/210, 0xd2}, {&(0x7f0000000b80)=""/165, 0xa5}, {&(0x7f0000000c40)=""/189, 0xbd}, {&(0x7f0000000d00)=""/167, 0xa7}], 0xa, &(0x7f0000000e80)=""/10, 0x6}, 0x10205) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:22 executing program 5: 08:17:22 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0005001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000008c, 0x43, 0x0) 08:17:22 executing program 0: 08:17:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000008d, 0x43, 0x0) 08:17:22 executing program 5: 08:17:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x70e000) 08:17:25 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0006001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:25 executing program 0: 08:17:25 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) getpeername(r0, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) setxattr$security_smack_transmute(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:25 executing program 5: 08:17:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000008e, 0x43, 0x0) 08:17:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa50c, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f21131d2000500130111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) 08:17:25 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0007001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000008f, 0x43, 0x0) 08:17:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = getpid() r2 = getpid() r3 = epoll_create(0xfff) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3}) 08:17:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x717000) 08:17:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0405519, &(0x7f0000001000)) 08:17:26 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x280aa0) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./bus/file0/file0\x00', r5, &(0x7f0000000200)='./bus/file0\x00', 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:26 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000a001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000090, 0x43, 0x0) 08:17:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fcntl$setstatus(r0, 0x4, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfffffffffffffeeb, 0x4000068, 0x0, 0x0) 08:17:26 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000c001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:26 executing program 5: 08:17:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000091, 0x43, 0x0) 08:17:26 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) init_module(&(0x7f0000000200)='trusted\'!trusted:+wlan0lomd5sum\x00', 0x20, &(0x7f00000002c0)='\x00') recvmmsg(r4, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r4, 0xd, 0x5d7e135f9b7b3ad2}, 0x10) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="cc010000960127fa67b072da850000000000000000000000000000000000000800000000000000e62fb1c2069200000000000000e7591714890d500f"], 0xfdef) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000300)=0x4, 0x4) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) 08:17:26 executing program 5: 08:17:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_route(0x10, 0x3, 0x0) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) socket$inet6(0xa, 0x0, 0x0) 08:17:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x760000) 08:17:28 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000e001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:28 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r1, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) r2 = getpgrp(0x0) setpriority(0x0, r2, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x0, 0x6}, {0xffffffff00000000}]}, 0x14, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', 0x0], &(0x7f0000000780)=[&(0x7f0000000540)='wlan1\x00', &(0x7f00000002c0)='proc\x00']) 08:17:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000092, 0x43, 0x0) 08:17:28 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000340)={{0x3c, @empty, 0x4e21, 0x3, 'lblcr\x00', 0x24, 0x800, 0x1f}, {@multicast1, 0x3, 0xff416950a7f9c44a, 0x80000001, 0x7fff, 0x9}}, 0x44) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) getdents(r2, &(0x7f00000002c0)=""/99, 0x63) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x7a}, 0x8202}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r3, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xc, 0x100000001, 0x2a8}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3}, 0x2c) 08:17:29 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e000f001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000093, 0x43, 0x0) 08:17:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xc, 0x100000001, 0x2a8}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3}, 0x2c) 08:17:29 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0010001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:29 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000094, 0x43, 0x0) 08:17:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8000a0) 08:17:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xc, 0x100000001, 0x2a8}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3}, 0x2c) 08:17:32 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r1, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) r2 = getpgrp(0x0) setpriority(0x0, r2, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x0, 0x6}, {0xffffffff00000000}]}, 0x14, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', 0x0], &(0x7f0000000780)=[&(0x7f0000000540)='wlan1\x00', &(0x7f00000002c0)='proc\x00']) 08:17:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0048001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000095, 0x43, 0x0) 08:17:32 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0)=r0, 0x12) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r6 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e004c001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000096, 0x43, 0x0) 08:17:32 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r1, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) r2 = getpgrp(0x0) setpriority(0x0, r2, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x0, 0x6}, {0xffffffff00000000}]}, 0x14, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', 0x0], &(0x7f0000000780)=[&(0x7f0000000540)='wlan1\x00', &(0x7f00000002c0)='proc\x00']) 08:17:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0060001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:32 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x800000000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm-control\x00', 0x1, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f00000001c0)={r5, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000a00)={@dev={0xfe, 0x80, [], 0x16}, @empty, @loopback, 0x10000, 0x7fffffff, 0x7fffffff, 0x100, 0x9, 0x20000, r5}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r6 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r6, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r6, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r6, &(0x7f0000000340)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1691e38c2069201000000000000e7591714890d5037d45649fa4f480a2ddb6588"}, 0x43) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x0, @mcast2, 0x3efa197a}], 0x1c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r7 = socket$inet(0x2, 0x200000002, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, r8) r9 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r9, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, r9) r10 = request_key(&(0x7f00000008c0)='cifs.idmap\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000940)='keyring$\x00', r9) keyctl$unlink(0x9, r8, r10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000097, 0x43, 0x0) 08:17:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8010a0) 08:17:35 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0068001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:35 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = getpid() r2 = getpid() r3 = epoll_create(0xfff) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3}) 08:17:35 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x70) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') socket$inet(0x2, 0x200000002, 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x2, 0x2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x220000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000008c0)=ANY=[]}, 0x78) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f00000002c0)=0x1e) 08:17:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x005\x00', @ifru_flags}) 08:17:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000098, 0x43, 0x0) 08:17:35 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e006c001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:35 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@md0='/dev/md0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)='nat\x00') 08:17:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x400000000000099, 0x43, 0x0) 08:17:35 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r4, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r4, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) getsockopt$rose(r4, 0x104, 0x4e0a6ee2a24b1159, &(0x7f00000000c0), &(0x7f0000000200)=0x4) 08:17:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") getitimer(0x3, &(0x7f0000000080)) 08:17:35 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0074001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8021a0) 08:17:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000009a, 0x43, 0x0) 08:17:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4188aea7, &(0x7f0000000040)) 08:17:38 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e007a001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:38 executing program 5: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) dup2(r0, r1) 08:17:38 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x1f) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0xfffffffffffffe20, &(0x7f00000003c0)=""/251, 0x41000, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x199}, 0xffffff0f) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r4 = socket$inet(0x2, 0x200000002, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r5, 0x3b72, &(0x7f0000000380)={0x20, 0x2, 0x80000000, 0x8, 0x7993}) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r6 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r6, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00000000c0)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r6, 0x1) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=r8, @ANYBLOB="10000000218c86ee3a4d6c523333a262580ca0"], &(0x7f0000000000)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000000c0)={r8, 0x8000}, &(0x7f0000000200)=0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r9 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r10 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$IP_VS_SO_SET_ZERO(r10, 0x0, 0x48f, &(0x7f0000000300)={0x2c, @loopback, 0x4e22, 0x4, 'wrr\x00', 0x50, 0x4, 0x2e}, 0x2c) 08:17:38 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00f0001d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000009b, 0x43, 0x0) 08:17:38 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105511, &(0x7f0000001000)) 08:17:38 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) r1 = gettid() ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811ece8f39092950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r1, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:38 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000031d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:38 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r2, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) setpriority(0x0, 0x0, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x10000, 0x6}, {0xffffffff00000000}]}, 0x14, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000640)='wlan1\x00'], &(0x7f0000000780)=[&(0x7f0000000540)='wlan1\x00', &(0x7f00000002c0)='proc\x00']) 08:17:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x960000) 08:17:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000009c, 0x43, 0x0) 08:17:41 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() setpriority(0x1, r0, 0x0) 08:17:41 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000051d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:41 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) accept4$packet(r2, &(0x7f0000007980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000079c0)=0x14, 0x80000) bind$bt_hci(r2, &(0x7f0000007a00)={0x1f, r3, 0x3}, 0xc) recvmmsg(r2, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) preadv(r4, &(0x7f0000000a80)=[{&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000200)=""/60, 0x3c}, {&(0x7f00000008c0)=""/184, 0xb8}, {&(0x7f0000000980)=""/193, 0xc1}], 0x4, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r5 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r7, r6, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r7, 0xffffffffffffffff, 0x8000000000d}, 0xe) r8 = getpid() sched_setscheduler(r8, 0x0, &(0x7f00000001c0)) r9 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$FS_IOC_ENABLE_VERITY(r9, 0x40806685, &(0x7f0000000c80)={0x1, 0x3, 0x1000, 0xce, &(0x7f0000000b40)="43d62d157bd5673ff4c4309926f68b2857243381bd8056e71f9706f72d4ed05ef466f9581a1596dcfb7d6e37214d7994f1eefe1ce1b808616b1ffee6735cd78eb0fbd222bd8dcb95344e54e28050ab101ecfcb434bd650d51174030a34700188ad84641c4b10561dcc658b08c7484b51776f639cc22b7bfa1f3561236880268e4af324afc82a13780a24922d111220a0cd1eb01052bbdb8c3716832c12916295429a24aad6c9836251e802e6d45c318ce6f6555e5c5dc78dd4bdcd85d8c60332f2a8e8018a95bb31f7abe52797ba", 0xc, 0x0, &(0x7f0000000c40)="38cbb25f7dabefbdf4be8978"}) syz_open_procfs(r8, &(0x7f00000000c0)='attr/exec\x00') syz_open_procfs(r5, &(0x7f0000000040)='mountstats\x00') r10 = socket$inet(0x2, 0x200000002, 0x0) r11 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r11, 0x400443c9, &(0x7f0000000b00)={{0x56ed, 0x9, 0x4, 0x5, 0x8, 0x2}, 0x1}) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:41 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r2, 0x1b3}}, 0x18) 08:17:41 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00ef051d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000009d, 0x43, 0x0) 08:17:41 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0), 0x0, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) write$selinux_attr(r2, &(0x7f00000002c0)='system_u:object_r:apm_bios_t:s0\x00', 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800fbff0000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb720300000032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb5e710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b1ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f60082383ba6cb0389db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e9a9fb0d3fe1befc42f717451d1f630256c08b8afbfa1c09b9eac772977a2b01108d5db00f75c66b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3a9cd57059a15b68956aa5aaf53fb12132f110c77a9bb735dd2811e1dffd0f72950a7e12bfc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb96319411de70490156deb46689ee813ea6d80ae78fe121c4fe9c2623b53547b96cf386df3fca4225411819e7338aabf43c310582aea478089fe4b85682f2fa5ffb7b42e6ede70dd6c56486f701d41a52e994202fb8eb99fc9a2808cdb518fc35e268e8758dbdc4390012db52bd0994c144d4a5c5a47ea90d2829d91e26c86b3db90289218229aff93775562b6711b7ebd9ccb1593790f0cd08036d30440091e8c76c3371c3854a9f69336ad705d586d25abb62057ad9f424dea9861e36b087f52108bf078b845d1991c29d6057edf9eefe5f12e943ebff9561684ebab5dc67a0de28b78192ebe5946a47652f893dd8d9feb1a94751342ac4b0194d4fe1a4d1384ab67c932276b125ca79ca520780fa4bff2c48c97a1591756f1736d36920c4fcd30201a700c3aeff952a461f15a2a631474626de7cbeb7c5d1d47705b942a717de19ef04825ec7f12ceaadadcffa36e2707276b432b1d67350515f4899b1142e150f6cc3e"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000340)='./bus/file0\x00', 0xe3, 0x4, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="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", 0xfc, 0x1}, {&(0x7f00000004c0)="94b9fc2e0b106037e15224e821540ceee24fb3cf732699d48bf69a0df5d05ad6bc9d4eaa293b5841ba93e66fddce0c7d3e8e909f30cc087845b6d159a9eefd7dffdb929e9a23060ade556d45d3ff47323e3a8290b53353cdc1efdb1ad26469e302d5942873fa4cdcc1128d47b98b218eee1c80f2fe80dd4666ff075122b845a43c4c72cff0c1b12495a08ed6449f59c2af9359ed392a078e61c375cf6cbfca5f59bef1b1fef2a147894d05d7b8", 0xad, 0x1}, {&(0x7f0000000cc0)="8aae461e02c0bcaea88675535597c9185332120e0e5aeb46eaf1dbfad41f57170e3e4ea689e438769558c1b3077488839cce2209ec07ebf413579b874e9c4b5ad0662ecc58b553b9c39fca86419e2216f3499043342182cad5c384dfebe6426a1f4f1fd67a2bc890319edb54e49e621b3059d9179311146cbab3c82fb32faf696d754c08d5a2fc1bab6a64a4d6b3639ad099ac4b67f72663de9ee3edd6ad5ac6", 0xa0, 0xfffffffffffffffc}, {&(0x7f0000000d80)="76e69e06e5dff83595119479cf82d05e2a4cc6bf481c2c4de323d3743d7d14cb2ba4b18c848eb9d4a5130f22fb41eb58838a24a727ce1614a0289cc589bde717593fc15bf09652f90a597b99110e702e82306af1543fe4016579d048cc50b4806d5534513e4b62f854fa", 0x6a, 0x9}], 0x0, &(0x7f0000000e80)={[{@quota_account='quota=account'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '}userppp1'}}, {@subj_user={'subj_user', 0x3d, 'wlan0self#vboxnet1vmnet0/.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x63, 0x61, 0x34, 0x33, 0x37, 0x66, 0x36], 0x2d, [0x33, 0x63, 0x6154f269785858c4, 0x65], 0x2d, [0x29f8502d61be4b9, 0x65, 0x39, 0x4d49ac1e7156e7b2], 0x2d, [0xa6, 0x36, 0x63, 0x66], 0x2d, [0x38, 0x65, 0x4f3e7e90e1d3e698, 0x32, 0x36, 0x65, 0x32, 0x66]}}}, {@obj_user={'obj_user', 0x3d, 'lrw(aes)\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r8, 0x6, 0x2, &(0x7f0000000200)={0x6, 0x100000001, 0xd1ec, 0xd278}, 0x6) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r4, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') r9 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:41 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000061d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:41 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r1, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x1, &(0x7f00000001c0)) r2 = getpgrp(0x0) setpriority(0x0, r2, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x0, 0x6}, {0xffffffff00000000}]}, 0x14, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 08:17:41 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xe07000) 08:17:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000009e, 0x43, 0x0) 08:17:44 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000071d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:44 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$VIDIOC_S_AUDIO(r6, 0x40345622, &(0x7f00000000c0)={0x9, "d24461a796f39551e41f02214dc280812505ea77b1067086d1e2afde12e22fcc", 0x5}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:44 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x43, 0x0, 0x0, 0x0, 0xffffffffffffff6b}, {0x0, [0x0]}}, 0xffffffffffffffff, 0x1b, 0x2b5, 0x2}, 0x20) 08:17:44 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000a1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:44 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, 0x0) 08:17:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x40000000000009f, 0x43, 0x0) 08:17:44 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:44 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) close(r0) 08:17:44 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) accept$unix(r2, &(0x7f00000002c0)=@abs, &(0x7f0000000200)=0x6e) syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x7ff, 0x40800) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xf05000) 08:17:47 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000c1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a0, 0x43, 0x0) 08:17:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:17:47 executing program 1: mknod(&(0x7f0000000080)='./bus/file0\x00', 0x25, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x8000000000d}, 0xe) syz_open_procfs(r0, &(0x7f0000000040)='mountstats\x00') r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 08:17:47 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000e1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a1, 0x43, 0x0) 08:17:47 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:17:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x1000000) 08:17:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 08:17:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000f1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:47 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a2, 0x43, 0x0) 08:17:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0061131d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:47 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:47 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000201d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 08:17:47 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x7) setresuid(0x0, 0xee01, 0x0) 08:17:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a3, 0x43, 0x0) 08:17:48 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x2000000) 08:17:50 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) lsetxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='seSMACK64IPIN\x00N\x1a\xd1\xf8\x1a\x00\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) getpriority(0x0, r2) wait4(r2, 0x0, 0x8000000d, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") 08:17:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getxattr(0x0, 0x0, 0x0, 0x0) 08:17:50 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000481d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a4, 0x43, 0x0) 08:17:50 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:50 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00004c1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:50 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a5, 0x43, 0x0) 08:17:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:50 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0065581d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:50 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0008000) 08:17:53 executing program 0: clone(0xe1b40d00, 0x0, 0x0, 0x0, 0x0) 08:17:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a6, 0x43, 0x0) 08:17:53 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000601d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:53 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') [ 1399.571170] IPVS: ftp: loaded support on port[0] = 21 08:17:53 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0013611d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:53 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:53 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a7, 0x43, 0x0) 08:17:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:54 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0058651d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1399.831356] IPVS: ftp: loaded support on port[0] = 21 08:17:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a8, 0x43, 0x0) 08:17:56 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:56 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000681d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:56 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0010000) 08:17:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="860f4c0e57c99ca0ad78349f5803fd3a1a6d5cb848ca6b3a32"], 0x1}}, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, 0x0) 08:17:56 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:56 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:56 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00006c1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000a9, 0x43, 0x0) 08:17:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0020000) 08:17:57 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000741d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:57 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000aa, 0x43, 0x0) 08:17:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x1}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) 08:17:57 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:57 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:17:57 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00007a1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:17:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ab, 0x43, 0x0) 08:17:57 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000811d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:17:57 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 08:18:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0040000) 08:18:00 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0xac, 0x0) 08:18:00 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0005ef1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:00 executing program 0: setpriority(0x2, 0x0, 0x392) 08:18:00 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="f153f533ae0b36e470f070") ptrace(0x10, r0) r2 = getpid() socketpair$unix(0x1, 0x4004000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) fcntl$setownex(r3, 0xf, &(0x7f0000000280)={0x2, r2}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)=0x0) wait4(r4, 0x0, 0x0, 0x0) 08:18:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0080000) 08:18:00 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000f01d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:00 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:00 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000000f008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:00 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:00 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:00 executing program 0: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 1406.320872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=22938 comm=syz-executor.4 08:18:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:01 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) 08:18:01 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20, @rand_addr=0x1c00000000}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x22640, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000100)={0x2, 0x4, 0x1}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x3f7) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000000)={0x3f, 0x10100000001, 0x3e, 0xfffffffffffffff9, 0x75ffba3f, 0x4}) 08:18:03 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:03 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:03 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000012008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:03 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0108000) 08:18:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000180)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x1, "00000100000000000800449476e252922c918f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3df5f163ee340b7679500800000000000000101013c5811039e15775027ecbf0e5bf5ff1b0816f3f6db1c000100000000000000326d3a09ffc2c654000100000000002100000000008000"}, 0xfffffffffffffeba) write$binfmt_aout(r3, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @default}, [@netrom, @remote, @remote, @default, @remote, @netrom, @bcast]}, &(0x7f0000000000)=0x48, 0x2b27916a556a4ea4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:03 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') [ 1409.218036] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:03 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000013008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:03 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:03 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000000)={0xffff, 0x206a}) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x43, 0x0) 08:18:03 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:03 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:03 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000014008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:03 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:03 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xa0218000) 08:18:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffda3, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0xc8a80) connect$netrom(r2, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r5 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000200)={r6, 0x3}, &(0x7f0000000240)=0x8) 08:18:06 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000015008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:06 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:06 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:06 executing program 0: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:06 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000016008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:06 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:06 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:06 executing program 0: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @local}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r1, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="cc01000096010012fe0c8048d271830000002ffdc15eb8fb0900000000000000e62fb1c2069240000000000000e7591714d01a5037d456490180000000000000"], 0xfdef) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000180)={0x1, 0x3}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f00000000c0)=0x8) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000018008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:09 executing program 0: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:09 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') 08:18:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xfeffffff) 08:18:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, r5) keyctl$setperm(0x5, r5, 0x80800) r6 = dup(r4) write$UHID_DESTROY(r6, &(0x7f0000000180), 0x4) recvmmsg(r6, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) 08:18:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, 0x0) 08:18:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000019008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:09 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:09 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001a008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e22}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x4, &(0x7f0000000000)) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, 0x0) 08:18:09 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:09 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:09 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) [ 1415.646800] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xfffffffe) 08:18:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, 0x0) 08:18:12 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000021d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:12 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r3, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000002c000000006dc6ac4a00c5cc4322cbe2e4eecaaa74741bea0286014936a954bc894cf756838a70", @ANYRES16=r4, @ANYBLOB="000226bd7000d1ede1fd08b35af4000000000241000000100013754b703a73797a3200000000b98e95b175e1111302bb4dbcd0571880ba31b74e714affbf470705fc7163b4348f73e46f313cf02e49d047fac40000d3ca4661436b32b85f58314036bb2108aafdcd0ee6a90cce81f34e6f5afa1ae204534a03b9caaedb438a2816fd9f9b569ab7cc2dec5e96251964ab4084a1441b6dee1ac21954531a43385e5a902337aae87e8cc295361967dc981dad3b13b2e7656e7dd282c9758ec2ce7cd4d29dc5e689487c293e90f8f442b7d82fa14b83147dba81af11eed2533c253187732dbb61f793f9f84cd7d800"/249], 0x3}, 0x1, 0x0, 0x0, 0x800}, 0x24048050) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:12 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:12 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000031d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:12 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:12 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:12 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) 08:18:12 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x301200, 0x0) sendto$inet(r0, &(0x7f00000000c0)="00febe92b71f0f985092572b06cb96bde3af1f170706825b2d8606071eae890609fdf40ccf27718b372868026d6e489336150e89d9adc3faac2bd0af83a27339b3455aba3e7440404b74b4ebe2bedf398696185c", 0x54, 0x8000, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r1, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r4 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$LOOP_CLR_FD(r4, 0x4c01) 08:18:12 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000041d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x1a0ffffffff) 08:18:15 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:15 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20, @empty}, 0xfffffffffffffec2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x25992f32c51e60a6}, 0x10) fsetxattr$security_smack_entry(r3, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='B\x00', 0x2, 0x5) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x101242) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:15 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000051d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:15 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) 08:18:15 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 08:18:15 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:15 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000061d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:15 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000000)) 08:18:15 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000071d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x2a0ffffffff) 08:18:18 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:18 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) 08:18:18 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000000)) 08:18:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f, 0xaaaaaaaaaaaae6b, &(0x7f0000000300)=[{&(0x7f0000000180)="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", 0xfd, 0x100000001}, {&(0x7f0000000280)="735f765547b5680746ec6a0562adf28b42a5c2f2bdded78429003518275691bacc3258b2cdbd38819c4cc604479ff77d991f32d162fec73bf1f4f30ac78c77ea91238ea4d93df23b8af40f0a3f94edd541e736a29afd9730abaa34e63115ce68a4075dc2b8612a", 0x67, 0x8}, {&(0x7f0000000100)="61ede8e01616d61c576ebc45fb34", 0xe, 0xfffffffffffffe01}], 0x1063020, &(0x7f0000000380)={[{@creator={'creator', 0x3d, "c9f50957"}}], [{@smackfsroot={'smackfsroot', 0x3d, 'trustedem1!eth0'}}, {@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, 'user-]\'{)vmnet1em1'}}, {@obj_role={'obj_role', 0x3d, 'bdev'}}]}) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:18 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000a1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:18 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000000)) 08:18:18 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000c1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:18 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x4a0ffffffff) 08:18:19 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 08:18:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000e1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:19 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) 08:18:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) openat$usbmon(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/usbmon0\x00', 0x600, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:19 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8a0ffffffff) 08:18:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000f1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:19 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 08:18:19 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000101d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0x3ff, 0x8001, 0x81, 0x6, 0xa, 0x7}) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, 0x1e6) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000140)={0x2, 0x4e20, @empty}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:19 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 08:18:19 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:19 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000481d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:19 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) 08:18:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000001000800120000000100000000000000000006000000000000000000000800000200e00040e0ff00000000000000000000000000ada800800400004015000000000003000600df120000020000809014ffbbf00000000000000003000500000100000200423b30632bd7b820000000000003"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 08:18:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x400000000000) 08:18:22 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:22 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00004c1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000180)={{0x0, 0x1, 0x3, 0x1, 'syz1\x00', 0x401}, 0x2, 0x40, 0x9, r3, 0x4, 0xffffffffffffffff, 'syz0\x00', &(0x7f0000000000)=['!!^-\x00', ',\x00', 'bdev\x00', 'vboxnet0\x00'], 0x15, [], [0x7, 0x6, 0x1000, 0xa9]}) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) ptrace$setsig(0x4203, r3, 0x2, &(0x7f00000002c0)={0x34, 0x6, 0x1a8}) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000001000800120000000100000000000000000006000000000000000000000800000200e00040e0ff00000000000000000000000000ada800800400004015000000000003000600df120000020000809014ffbbf00000000000000003000500000100000200423b30632bd7b820000000000003"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 08:18:22 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) 08:18:22 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000601d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:22 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) [ 1428.152198] cgroup: fork rejected by pids controller in /syz3 08:18:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="157a7114317634bffb2942066df435b07c40d946484157337fd62b0fac56dd5d422e31f514094ce44adb7e32e81c46f26e986cbc2e250a3dabc148f8cd18151223e341aed7265d6f31e9a802df5781e30ae2223a8715269ffee1538cce1ec7d9ca9b7f5bd63ad2aecf1e1a27b8046b2e91a2ec3b64e4599b074573f1ef90c4ffd96cd3a8693988df9bdaec", 0x8b, 0x4, &(0x7f0000000100)={0x77359400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000000c0)={r3, r4/1000+30000}, 0x10) 08:18:22 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000681d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:22 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socket$inet(0x2, 0x3, 0x100000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000002000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000079c500000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c3000000000000000000000007c756e6c300000000000000000000000766c616e3000000000000000000000aaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000000000"]}, 0x3aa) recvmmsg(r3, &(0x7f0000001f00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/169}, {&(0x7f0000000240)=""/174}, {&(0x7f0000000300)=""/201}, {&(0x7f0000000400)=""/255}, {&(0x7f0000000000)=""/18}, {&(0x7f0000000500)=""/154}], 0x0, &(0x7f0000000640)=""/80}, 0x80000000}, {{&(0x7f00000006c0)=@caif=@dbg, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000740)=""/93}]}, 0xfffffffffffff5d1}, {{&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000880)=""/179}, {&(0x7f0000000940)=""/68}, {&(0x7f00000009c0)=""/145}], 0x0, &(0x7f0000000ac0)=""/142}, 0x10001}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000b80)=""/68}, {&(0x7f0000000c00)=""/85}, {&(0x7f0000000c80)=""/192}, {&(0x7f0000000d40)=""/25}, {&(0x7f0000000d80)=""/243}], 0x0, &(0x7f0000000f00)=""/4096}, 0x9c}], 0x1, 0x43, 0x0) 08:18:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x555557505000) 08:18:25 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 08:18:25 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00006c1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:25 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:25 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0xd}, 0x3bd) 08:18:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r2, &(0x7f00000008c0)=[{&(0x7f0000000000)="e1205e88acbe41fea59f4ef224ffded8e6e9ef9899a352eca68e04f1b304bba79fc12fbb8d17d1ae539dc0b455b7033a5320709159e69bcc174423cc8dce2ca47c6a65ab979f36bffc40b60816fb1ffc", 0x50}, {&(0x7f0000000180)="e2f8e5bdf440a31086ea1773103c259b669381cc1196cff1812cc90fb3dce454166cd56e9768723c5dff48da2db3f456f6ddfe4f4928f1f87d43755fc34ebb03b9e045590fd1bf3ca7469ef59f16646f1bc3bcb158427c54109456e9d97140ed25fb47195dc9359b3dd281d078b0497e042426d938def27d3ecf432b47bbac33787269a1083f9d9315efb5dd495c6b911453187e6cfc6ec817639515b77aef74d248e28802f0150740f0d754e9f60af066d5e28a41a38e0544e4a8ce0982125f25a0c72e025d17d3f3e69238042dfdb50c401fcd2a7cfe32989f511df23ecbcf23308ebad702d7194327fa2401c7ceb8de11b60361", 0xf5}, {&(0x7f00000000c0)="3076f57f0c716ab6be0cfc57d1fda2d07383aadd15e5f0580424f5850f5089f21d35389c989c0de4a5124e3a4a7d851b462464714a9a5b", 0x37}, {&(0x7f0000000100)="d497d4d1907adec7d44dd1ea208dff37636802ab8e6d6205860a588acd0a38c076e6c851ceb5", 0x26}, {&(0x7f0000000280)="fe611ff56c921b82898086", 0xb}, {&(0x7f00000002c0)="fdaf3c75ac5420f6f81268f737387f8e4c0aa62c2370d8a0b1020f5ec96df4b97664d298f425e84a0e5607592de488fd34ad0586774d2d81fdd868fb80c69d5513df7c242f6fbe2c32de5e51990266ce798052f0ba56116c2f0b1adb5fd5f425cfc0393b76742a52e4aa6e957ab147032c1797376fc4519fc1de", 0x7a}, {&(0x7f0000000340)="d0e8162cb4699f1dedf35aabe50ba62b18e2e95b561d857796f675c94996d64766bbf1642f45612dd0f3627d4dfbfc714b94f4726182c4ffd489f2a876e12c9d547ba522f0e03c5acbc871bde3fd8ee83e3a71fe289fc46a0beca615c1a0af18f45d08adf478c93c4fcb259f6e2264436196835d2583c1cf80af031e7e6a266b6155a0e4f71c3b87bb5cff14e7931f4f779653440d631959016b8dcc67aad16973957ed6263759207967", 0xaa}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="c2eb382ed5282154f7dfc9906865d819698bce9b294d1ceae769f13daf30aa77d4d731abfdb9ed641c95ba744c3b2787353f395049f9033a385b35920843f9cedd13c469fb07f4e8aaec9cbc86b2ad32", 0x50}, {&(0x7f0000000540)="b80a60f3a201d9a4b7404a792672e74cab416ce48e91c03c3d33e8fcbb3259d2c0af40139067fccb58538b39644daba09a3338c8738c", 0x36}], 0xa, 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYRES64=0x0]}, 0x80) recvmmsg(r3, &(0x7f0000000040), 0x0, 0x43, 0x0) 08:18:25 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 08:18:25 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000741d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x555557527000) 08:18:25 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") 08:18:25 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, 0x0, 0x0) 08:18:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0xfffffe3f) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000040)="6a08da0b", 0x16a) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x41) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendto$inet6(r0, &(0x7f0000000100)="ce04110075000100ff901efc67195c22cc66bf00000000070000e1", 0x18a, 0x0, 0x0, 0x0) 08:18:25 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, 0x0, 0x0) 08:18:25 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00007a1d008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x760000000000) 08:18:25 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x401, 0xbb02) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000001c0)={'security\x00', 0x2, [{}, {}]}, 0x48) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$VIDIOC_OVERLAY(r5, 0x4004560e, &(0x7f0000000000)=0x4) 08:18:25 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000005f008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:25 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, 0x0, 0x0) 08:18:26 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) [ 1431.749019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pig=24408 comm=syz-executor.4 08:18:26 executing program 2: r0 = socket$inet(0x2, 0x80000, 0x1) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}], 0x10) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:26 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080), 0x0) 08:18:26 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000067008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:26 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000000f008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f00000000c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000000)=""/53, 0x35}, 0x120) [ 1431.936448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=24433 comm=syz-executor.4 08:18:26 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080), 0x0) [ 1432.101631] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.129859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=24509 comm=syz-executor.4 [ 1432.142787] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.162779] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.238403] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.246029] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.254777] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.261911] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.269415] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.276663] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.283498] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.290785] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.297947] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.305230] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.312099] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.319294] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.326581] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.333375] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.340542] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.347886] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.355116] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.362374] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.369761] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.383180] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.390652] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.404423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.418411] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.426801] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.433761] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.447293] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.458696] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.468299] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.478901] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.487827] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.496972] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.506150] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.513132] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.522021] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.531040] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.539797] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.548522] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.557403] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.566238] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.573039] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.582286] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.591136] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.600225] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.609355] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.618074] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.627016] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.633755] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.642502] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.651058] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.660057] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1432.671426] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 08:18:28 executing program 2: ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x2, 0x44}) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @random="967b355e5476", 'rose0\x00'}}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:28 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080), 0x0) 08:18:28 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:28 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) socket$nl_xfrm(0x10, 0x3, 0x6) 08:18:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x7fffffffeffc) 08:18:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'nr0\x00', 0x9}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffff68, 0x0, 0x0, 0x4c5) [ 1434.625719] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:28 executing program 2: r0 = socket$inet(0x2, 0x80000, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:29 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{0x0}], 0x1) 08:18:29 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x7fffffffefff) 08:18:29 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{0x0}], 0x1) 08:18:29 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000012008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000240)={@vsock={0x28, 0x0, 0x0, @my=0x0}, {&(0x7f0000000180)=""/142, 0x8e}, &(0x7f00000000c0), 0x40}, 0xa0) 08:18:29 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) [ 1435.196882] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:29 executing program 5: shmat(0x0, &(0x7f0000ff2000/0x3000)=nil, 0x7000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000080)=[{0x0}], 0x1) 08:18:29 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:29 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000013008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x1000000020000000, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(0xffffffffffffffff, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) r4 = creat(0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r5, 0x1, 0x5, &(0x7f000059dffc), 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r4, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000480)) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000440)=@hat={'permhat ', 0x0, 0x5e, ['vmnet1]-\x00']}, 0x24) 08:18:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sysinfo(&(0x7f0000000240)=""/4096) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0xb1, 0x3, 0x0, 0x0, 0x6, 0x0, 0x80, 0x845d, 0x6, 0xf3ea, 0x10000, 0x16db, 0x8001, 0x20, 0x8, 0x13}}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000001680)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0xffffffffffffff54) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) fstat(r3, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000012c0)=0x0, &(0x7f0000001540), &(0x7f0000001580)) write$FUSE_CREATE_OPEN(r7, &(0x7f00000015c0)={0xa0, 0x0, 0x8, {{0x3, 0x0, 0x8, 0x4, 0x10001, 0x433, {0x2, 0xab, 0x3, 0x8, 0x1000, 0xe1c, 0x9, 0x8, 0x80, 0x4, 0x2, r8, r9, 0x101, 0x80000000}}, {0x0, 0xa}}}, 0xa0) r10 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x245) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:29 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:29 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000014008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x960000000000) 08:18:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}, 0x40}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$RTC_WIE_ON(r5, 0x700f) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:32 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000015008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:32 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 08:18:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r2}}, 0x18) 08:18:32 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000016008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x3) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x50505755550000) 08:18:32 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:32 executing program 0: 08:18:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000018008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x70525755550000) 08:18:32 executing program 5: ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 08:18:32 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 08:18:32 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000019008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:32 executing program 5: ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) sendto$inet(r1, 0x0, 0x0, 0x1800, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$SIOCGSTAMP(r2, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]}, 0x3d4) prctl$PR_GET_NAME(0x10, &(0x7f00000000c0)=""/22) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000000)={0xcc}, 0x4) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000ac, 0x43, 0x0) 08:18:33 executing program 5: ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:33 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001a008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/83, 0x39f) getdents64(r0, &(0x7f0000000080)=""/83, 0x53) 08:18:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4c4483, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f00000000c0)={0x0, 0x28, [0x101, 0x7, 0x8, 0xffff, 0x1, 0x9, 0x1000, 0x7, 0x100000000, 0x3]}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40040000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x128, r4, 0xffd19d5c13ec5a3b, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffff63}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf29}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe82}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x68299519}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1fc0000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}]}]}, 0x128}, 0x1, 0x0, 0x0, 0xc050}, 0x80) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:33 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 08:18:35 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:35 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x202400) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r3, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000000c0)=0x2000001, 0xa53) dup(r1) openat$cgroup_ro(r2, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000000280)=@can, 0xfffffffffffffe7a, &(0x7f0000001ec0), 0x0, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000000300)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0, 0xfffffffffffffe9f}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r11 = accept$alg(r10, 0x0, 0x0) r12 = dup(r11) write$UHID_DESTROY(r12, &(0x7f0000000080), 0xfff2) recvmmsg(r12, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) timerfd_gettime(r12, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x6) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x70710000000000) 08:18:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:18:35 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:35 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) [ 1441.463541] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:35 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x500, 0x6, 0x4, 0x0, @dev, @empty=0xac141400, @random="eb5de09d9520", @dev}}}}, 0x0) 08:18:35 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000005f008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:35 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x6004000, &(0x7f0000000140)={0x2, 0x4e21, @empty}, 0xfffffffffffffe98) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) [ 1441.647620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pig=26018 comm=syz-executor.4 08:18:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff76, 0x8794757809da0d64, &(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:36 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000067008105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:36 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x448000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2, 0x2000) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) [ 1441.862891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=26158 comm=syz-executor.4 08:18:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8000a0ffffffff) 08:18:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @empty}, {0x2, 0x0, @broadcast}, 0x8fb5bb681ea07c84, 0x0, 0x2, 0x46a}) 08:18:38 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x1}) 08:18:38 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d028105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:38 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="cc01000096010000000000000000000000000000000000000800000000000000e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d1e704050eb70e6bf33cc666e83c1a8cd93289337e46c3bcf0db3519cb8c65639d67f3345f4470fbb4b79752c84e13528968dfd4ac5f76769fae4efb46ba71710076ab3615ae76d90b6998b2f369c33ba84a50357fb540e718f5394610a88dbff02c8836c8716f6fe56946dc653d27ee6a3740cff1dd47c249cb0a9a30d062273879e93d8e64fd11662e94665e17bbc790326c84b6f"], 0xfdef) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000000)={0x4, 0x1, 0xc0c8}, 0x10) 08:18:38 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x1}) [ 1444.520280] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=541 sclass=netlink_route_socket pig=26173 comm=syz-executor.4 08:18:38 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d038105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) clone(0x100049fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x4206, r3) 08:18:38 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, 0x0) 08:18:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @default}, [@bcast, @bcast, @netrom, @null, @remote, @netrom, @default, @default]}, &(0x7f0000000000)=0x48) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r4, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r4, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) connect$vsock_dgram(r4, &(0x7f0000000180), 0x10) 08:18:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8010a0ffffffff) [ 1444.752778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=797 sclass=netlink_route_socket pig=26188 comm=syz-executor.4 08:18:39 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, 0x0) 08:18:39 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d048105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r4, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x1, 0x4]}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080), 0x10) syz_emit_ethernet(0x6a, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r6, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000440)=@hat={'permhat ', 0x0, 0x5e, ['vmnet1]-\x00']}, 0x24) 08:18:39 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, 0x0) 08:18:39 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f00000001c0)}) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$TIOCGLCKTRMIOS(r6, 0x5456, &(0x7f0000000000)={0x1000, 0x100000001, 0x9341, 0x6, 0x1, 0x3, 0x3f, 0x3, 0x6ee4, 0x7ff, 0x1ff, 0x65}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) [ 1445.093888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1053 sclass=netlink_route_socket pig=26312 comm=syz-executor.4 08:18:39 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)) 08:18:39 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d058105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1445.341887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1309 sclass=netlink_route_socket pig=26394 comm=syz-executor.4 08:18:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}, 0x491) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0xd0000, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000000)=0x0) sched_getparam(r4, &(0x7f00000000c0)) 08:18:39 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)) 08:18:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8021a0ffffffff) 08:18:42 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d068105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000)=[{}, {}, {}], 0x3, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r4, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x1, 0x4]}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080), 0x10) syz_emit_ethernet(0x6a, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r6, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000440)=@hat={'permhat ', 0x0, 0x5e, ['vmnet1]-\x00']}, 0x24) 08:18:42 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x6995e729e2bbd490, 0x0) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e20, @remote}, 0x10) r2 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@rand_addr, @multicast2}, &(0x7f0000000280)=0xc) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r2, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r2, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000000)={{0x6, 0x1, 0xfffffffffffffffb, 0xd9c7, 0x1ff, 0x5}, 0x1, 0x20, 0xffffffff00000001}) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r5, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r5, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r6 = accept$inet6(r5, 0x0, &(0x7f00000002c0)) fsetxattr$security_selinux(r6, &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:syslogd_exec_t:s0\x00', 0x24, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x43, 0x0) 08:18:42 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)) [ 1447.863380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1565 sclass=netlink_route_socket pig=26462 comm=syz-executor.4 08:18:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') openat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 08:18:42 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d078105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)) 08:18:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) [ 1448.130013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1821 sclass=netlink_route_socket pig=26476 comm=syz-executor.4 08:18:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x48044, &(0x7f0000000000)={0x2, 0x4e1c, @loopback}, 0x34d) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f00000001c0)) r5 = dup(r3) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0), 0x4000000000000e0, 0x2000, 0x0) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x280, 0x0) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000200)={{0x2, 0x4e22, @broadcast}, {0x1, @local}, 0x28, {0x2, 0x4e21, @multicast1}, 'ip_vti0\x00'}) ioctl$LOOP_SET_FD(r5, 0x4c00, r1) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040), 0x0, 0x2020, 0x0) 08:18:42 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) [ 1448.356347] QAT: Invalid ioctl 08:18:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xe0700000000000) 08:18:45 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d0a8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) sendto$inet(r0, 0x0, 0xffffffffffffff9b, 0x4040000, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1ff, 0x80) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="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", 0xffb2, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000200)=""/79, 0xffffffffffffff62) 08:18:45 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:45 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) 08:18:45 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1450.953948] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2589 sclass=netlink_route_socket pig=26705 comm=syz-executor.4 08:18:45 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d0c8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xf0500000000000) [ 1451.147338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3101 sclass=netlink_route_socket pig=26807 comm=syz-executor.4 08:18:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4000000, &(0x7f0000000140)={0x2, 0x4e20, @rand_addr=0x8}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:45 executing program 0: 08:18:45 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d0e8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:45 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getdents64(r1, &(0x7f0000000080)=""/83, 0x39f) getdents64(r1, &(0x7f0000000180)=""/83, 0x53) 08:18:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:45 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0xd, 0x24000421, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0xffffffffffffffff}, 0x12be57b2adef636d) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f000000a200)=[{{&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, &(0x7f00000011c0)=""/9, 0x9}, 0x80}, {{&(0x7f0000001200)=@pppol2tp, 0x80, &(0x7f0000002580)=[{&(0x7f0000001280)=""/34, 0x22}, {&(0x7f00000012c0)=""/62, 0x3e}, {&(0x7f0000001300)=""/17, 0x11}, {&(0x7f0000001340)=""/60, 0x3c}, {&(0x7f000000a440)=""/76, 0x4c}, {&(0x7f0000001400)=""/174, 0x35}, {&(0x7f00000014c0)=""/152, 0x98}, {&(0x7f0000001580)=""/4096, 0x1000}], 0x8, &(0x7f0000002600)=""/252, 0xfc}, 0x7}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002700)=""/132, 0x84}, {&(0x7f00000027c0)=""/206, 0xce}, {&(0x7f00000028c0)=""/148, 0x94}, {&(0x7f0000002980)=""/59, 0x3b}, {&(0x7f00000029c0)=""/241, 0xf1}], 0x5, &(0x7f0000002b40)=""/128, 0x80}, 0x4}, {{&(0x7f0000002bc0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000002c40)=""/198, 0xc6}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/54, 0x36}, {&(0x7f0000003d80)=""/90, 0x5a}, {&(0x7f0000003e00)=""/42, 0x2a}, {&(0x7f0000003e40)=""/4096, 0x1000}], 0x6, &(0x7f0000004ec0)=""/73, 0x49}, 0x580b}, {{&(0x7f0000004f40)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000065c0)=[{&(0x7f0000004fc0)=""/82, 0x52}, {&(0x7f0000005040)=""/229, 0xe5}, {&(0x7f0000005140)=""/67, 0x43}, {&(0x7f00000051c0)=""/122, 0x7a}, {&(0x7f0000005240)=""/199, 0xc7}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/200, 0xc8}, {&(0x7f00000064c0)=""/198, 0xc6}], 0x9, &(0x7f0000006680)=""/61, 0x3d}, 0x400}, {{&(0x7f00000066c0)=@alg, 0x80, &(0x7f0000007840)=[{&(0x7f0000006740)=""/23, 0x17}, {&(0x7f0000006780)=""/4096, 0x1000}, {&(0x7f0000007780)=""/181, 0xb5}], 0x3}}, {{0x0, 0x0, &(0x7f0000007a40)=[{&(0x7f0000007880)=""/232, 0xe8}, {&(0x7f0000007980)=""/172, 0xac}], 0x1, &(0x7f0000007a80)=""/95, 0x5f}, 0x7}, {{&(0x7f0000007b00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000007c80)=[{&(0x7f0000007b80)=""/40, 0x28}, {&(0x7f0000007bc0)=""/181, 0xb5}], 0x2, &(0x7f0000007cc0)=""/101, 0x65}, 0x9}, {{0x0, 0x0, &(0x7f000000a080)=[{&(0x7f0000007d40)=""/4096, 0x1000}, {&(0x7f0000008d40)=""/153, 0x99}, {&(0x7f0000008e00)=""/95, 0x43}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/61, 0x3d}, {&(0x7f0000009ec0)=""/224, 0xe0}, {&(0x7f0000009fc0)=""/83, 0x53}, {&(0x7f000000a040)=""/10, 0xa}], 0x8, &(0x7f000000a100)=""/199, 0xc7}, 0x6}], 0x9, 0x100, 0x0) [ 1451.553892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3613 sclass=netlink_route_socket pig=27002 comm=syz-executor.4 08:18:45 executing program 0: pipe(0x0) 08:18:45 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d0f8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:45 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1451.728048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3869 sclass=netlink_route_socket pig=27255 comm=syz-executor.4 08:18:48 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d108105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:48 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0xffffffffffffffff}) 08:18:48 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:48 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x100000000000000) 08:18:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000240)={0x7e, 0x7, 0xdc, 0xffff, 0x101, 0x7}) getpeername$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', r5}) r6 = accept$alg(r4, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) ioctl$KVM_GET_XSAVE(r7, 0x9000aea4, &(0x7f00000008c0)) 08:18:48 executing program 0: connect(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000002f00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffee5}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002cc0)=ANY=[@ANYBLOB="020a000007000000000000000000de0005001a0000000100041727fbb0fde70100000001000000534f8200000000ffffac1414b206000102c3abe8fbcc006c22f21cff9ae063af3cd475ceb4c385c8e8a8446e7549691b66091717d16f6e00a58486aef2ad7ce006651e61f39a451e6e4994afc820d96bacc0bcc36aba4f8178c5bd238b123e16b3755c9b35a82bcb8a871f4398508f3321f65dd90ca9600cab228c541c95c6965d529bfacca815bda123ab0c9acccdcf74f551e578100c32f10a11200d2dcac2d4ca6f1ffffccf9032a96b792eed"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000144, 0x0) [ 1454.394301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4125 sclass=netlink_route_socket pig=27267 comm=syz-executor.4 08:18:48 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:48 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:48 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d488105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$FUSE_OPEN(r2, &(0x7f0000000000)={0x20, 0xfffffffffffffff5, 0x8}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:48 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:48 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) [ 1454.613248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18461 sclass=netlink_route_socket pig=27412 comm=syz-executor.4 08:18:48 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d4c8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r3, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r4, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r4, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) bind$bt_hci(r3, &(0x7f0000000100)={0x1f, r5, 0x3}, 0xc) 08:18:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1454.787930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19485 sclass=netlink_route_socket pig=27514 comm=syz-executor.4 08:18:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x200000000000000) 08:18:51 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d608105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:51 executing program 0: 08:18:51 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x2081) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:51 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:51 executing program 0: 08:18:51 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1457.456994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24605 sclass=netlink_route_socket pig=27625 comm=syz-executor.4 08:18:51 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d688105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x2db, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:51 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:51 executing program 0: [ 1457.697934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26653 sclass=netlink_route_socket pig=27720 comm=syz-executor.4 08:18:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x8000000000000000) 08:18:54 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:54 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d6c8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:54 executing program 0: 08:18:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r1, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @broadcast, 'veth0_to_team\x00'}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:54 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:54 executing program 0: [ 1460.566258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27677 sclass=netlink_route_socket pig=27754 comm=syz-executor.4 08:18:54 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x440200, 0x0) sendto$inet(r1, 0x0, 0xfd7f, 0x4000000, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x40) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:18:55 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d748105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:55 executing program 0: 08:18:55 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1460.895883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29725 sclass=netlink_route_socket pig=27873 comm=syz-executor.4 08:18:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xfcefffffff7f0000) 08:18:57 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:18:57 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d7a8105e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000000)="6769856c2f9153b709e62754186e3c180a28", 0x12}, {&(0x7f0000000180)="0f2fa648dabb40592d94160fc759949fffde05466e4a8f8d6f826aa4a9fd2684159c7a6710b227129f2b8d07072898de9f96fe356ff790df9d989b102ed7e29c80c91f99fda4210e26126b85ade85d0678bd64c9859b5ab783f85073f7767c2e9153019e4e2db77ceaec4c5dc8b38f9bb3f7c9586e2ab08fe3b5aec86f3a5969883d248f57d535b3dc60f12611a624b55531f96a9a7cd1218ea398f312f6de634b3232964362b6b91640258762ad5ae4e4cc3c427400c90647d10f9b4080fe92573c84467096a7d0417fd85d3614bce53982c3105a60b7f2cab6b272add356cf133bce990fef6460937a", 0xea}, {&(0x7f0000000080)="ca315cf1fcf672a58392906a8fe5e8aa526cfdbf8d08d58629a34fef1df773495f1ad58b0301d9148e6a3b8cfa9af1d1a6719bb81fc7281edd6292e7a369ec2bf628580db9fa0dafd261a0", 0x4b}, {&(0x7f0000000280)="7a8d43f5526a08992ad2c1d3bf5a66bfd19dd89b3b6a494d09bf1124049dd6b0773fa1f13a204a20fcb0cb32488197cb6d2558794732a61bfc8cec4facbb21235c387954aad179773a081cc1bc006e727661f96a9f9e907c873c0b38f304d8046407f36e2341da93ae3b", 0x6a}, {&(0x7f0000000300)="91e4e0a85b94ac943813224027d32e4008e332166d71fbd2cbc506e2adb22968fd1ac02709c590e2fad2b3bbbdf0f7de4492aa9e40b22738a644af6bb5b1fd17329fc099d19eaae2c1febfbce4b621e83b70e631ab6298adee5ecb0743ba17a4bc2261d63d8c486f09af779eccdd66c1ee75df312fcd7fed08acd9cfce947b3ee3086e026764ea35c1cf5b2edb8e1bf569eb05175c24b513622afe4ddb2e4daace36d0d400fa7387a52212805127da41fc7271e85b3f", 0xb6}, {&(0x7f00000003c0)="109227c5006b5199b4e678d0d441f11925918f463f59a2caeb3c756a4bdd8fe4ac0d2baeb3ffeed749282a85d158f440d0aee63299fb5e549b7ea14e4495eb68be29792b5d195f066f5db24c65f9e6e0a6a3194a959dfbafe257d81ed7c33ee839b1706ede50192d5541", 0x6a}, {&(0x7f0000000440)="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", 0xfc}], 0x7, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x1) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000005c0)) 08:18:57 executing program 0: 08:18:57 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:57 executing program 0: [ 1463.631207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31261 sclass=netlink_route_socket pig=27891 comm=syz-executor.4 08:18:57 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008106e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:18:57 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:18:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0, 0xfef8}], 0x4, &(0x7f0000001f40)=""/147, 0x34a}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0), 0x1}, 0x7}], 0xb8, 0x2000, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x8, 0xc0000000000, 0x5, 0x401}, {0x2, 0x8, 0x0, 0x3}]}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x40485404, &(0x7f00000000c0)={{0x0, 0x1, 0x3f, 0x3, 0x7}, 0x8, 0xff}) 08:18:58 executing program 0: [ 1463.850780] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:18:58 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xfeffffff00000000) 08:19:00 executing program 0: 08:19:00 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008109e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:00 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) io_setup(0x9, &(0x7f00000000c0)=0x0) r5 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r6 = dup(r5) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r8, 0x15, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_SET(r6, &(0x7f0000000400)={&(0x7f0000000300), 0xffbf, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r8, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x0, 0x7, [@TIPC_NLA_NET_ADDR={0x0, 0x2, 0x4b95}, @TIPC_NLA_NET_NODEID_W1={0x0, 0x4, 0xc74}]}, @TIPC_NLA_NODE={0x0, 0x6, [@TIPC_NLA_NODE_ADDR={0x0, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x0, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x0, 0x1, 0x1}, @TIPC_NLA_NODE_UP, @TIPC_NLA_NODE_ADDR={0x0, 0x1, 0x174c00000000000}, @TIPC_NLA_NODE_UP, @TIPC_NLA_NODE_UP, @TIPC_NLA_NODE_UP]}, @TIPC_NLA_NET={0x0, 0x7, [@TIPC_NLA_NET_ID={0x0, 0x1, 0x3d0}, @TIPC_NLA_NET_ID={0x0, 0x1, 0x3f7}]}]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r9 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r9, 0x40086602, &(0x7f00000002c0)=0xa) io_getevents(r4, 0x1, 0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)={0x0, 0x1c9c380}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:00 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1466.683746] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:01 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:01 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d00810ae00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:01 executing program 0: 08:19:01 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1466.902643] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:01 executing program 0: 08:19:01 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008135e00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) [ 1467.201032] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xffefffffff7f0000) 08:19:04 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r1 = accept4(r0, &(0x7f00000001c0)=@ax25={{}, [@bcast, @null, @null, @netrom, @default, @rose, @netrom, @netrom]}, &(0x7f0000000240)=0x80, 0x1000) fcntl$getownex(r1, 0x10, &(0x7f0000000340)) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r2, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) getpeername(r4, &(0x7f0000000280)=@ethernet={0x0, @remote}, &(0x7f0000000300)=0x80) dup(r3) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x7) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r7 = getpid() sched_setscheduler(r7, 0x0, &(0x7f00000001c0)) fcntl$setownex(r6, 0xf, &(0x7f00000003c0)={0x6, r7}) r8 = accept$alg(r5, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) bind$alg(r9, &(0x7f0000000500)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) recvmmsg(r9, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x48}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xfffffffffffffef2}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x64, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:04 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:04 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:04 executing program 0: 08:19:04 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d00815fe00f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:04 executing program 0: [ 1469.799456] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:04 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:04 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e05f80ecdb4cb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:04 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]}, 0x3ad) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) dup(0xffffffffffffffff) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) sendto$inet(r3, &(0x7f00000002c0)="ff7097cb97bed212cb4ce27db22513ac15334300000000000000719d4af6f31a4764d7eb7a3c69eaf63c", 0x2a, 0x20488, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) shutdown(r2, 0x1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={r5, 0x10, "218c86ee2a4d6c523333a272f6580ca0"}, &(0x7f0000000000)=0x18) r6 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r6, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r6, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r6, &(0x7f0000000040)={{0x1cc, 0x0, 0x0, 0x196, 0x0, 0x0, 0x0, 0x0, 0x8}, "e62fb1c2069200000000000000e7591714890d5037d45649fa4f745d"}, 0xfdef) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000180)={r5, 0x10000000000021, 0xffffffffffffffd3, "bcacd4baca08a8b441a8302deb9fd2cbbd19e3b93a43301d3dad1268ba738b3cbacac5b76795164068288650a32b984782ab800f789158d83d64efd196a5552d16b16856ebdd5d943a23a8aaa0fb61df02c2c50123d7955edb8986c2caf4af73c02a335c32307ca756d1718522640b3e112cf576488debd2082ad5d98bbb97dd8669e3aacf6e415e382aacd11fe55e432935d345ae495a0e4c92f1f33cb62f33720d70666f0a3baab518e48919ba9cd294707e872a0f9a5f24cc3fb95ea115b3b85b709bd4d7c17ea34c53935314273bf89134bc4c"}, 0xcc) ioctl$SIOCGSTAMP(r1, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:04 executing program 0: 08:19:04 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1470.180408] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:07 executing program 0: 08:19:07 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:07 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb5fb9f207c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:07 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xffffffff00000000) 08:19:07 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x800, 0x0) write$P9_ROPEN(r3, &(0x7f00000004c0)={0x18, 0x71, 0x1, {{0x91, 0x2, 0x2}, 0xffffffffffffc721}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) process_vm_writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000180)=""/160, 0xa0}], 0x1, &(0x7f0000000440)=[{&(0x7f0000000240)=""/233, 0xe9}, {&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000340)=""/215, 0xd7}], 0x3, 0x0) [ 1472.854463] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:07 executing program 0: 08:19:07 executing program 5: r0 = socket(0x0, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:07 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f204c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:07 executing program 0: 08:19:07 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f210c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:07 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f00000000c0)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x10, "218c86ee2a4d6c523333a272f6580ca0"}, &(0x7f0000000000)=0x18) r7 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f0000000480)={0x7fff, {{0x2, 0x4e22, @empty}}}, 0x88) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0xfffffffffffffde7) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0xee01, r12) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r13) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r14) fchownat(r10, &(0x7f00000000c0)='./file0\x00', r12, r14, 0x1000) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:19:07 executing program 0: 08:19:07 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:07 executing program 5: r0 = socket(0x0, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:07 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f235c804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xffffffffa0008000) 08:19:10 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f25fc804a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:10 executing program 0: 08:19:10 executing program 5: r0 = socket(0x0, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f00000021c0)=[{{&(0x7f0000001240)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000001300)=""/121, 0x79}, {&(0x7f0000001380)=""/82, 0x52}], 0x3, &(0x7f0000001400)=""/173, 0xad}, 0x3ff}, {{&(0x7f0000001a00)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/81, 0x51}, {0x0}, {0x0}], 0x4, &(0x7f0000001f40)=""/147, 0x93}}, {{&(0x7f0000002000)=@caif=@rfm, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x7}], 0x3, 0x2000, 0x0) write$P9_RSETATTR(r3, &(0x7f00000000c0)={0x7, 0x1b, 0x1}, 0x7) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x40000004e20, @rand_addr=0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r5, 0x5201) 08:19:10 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:10 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c802a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:10 executing program 0: 08:19:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001180)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/4096}, &(0x7f0000000000)=0x78) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:10 executing program 5: r0 = socket(0x2, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xffffffffa0010000) [ 1476.146600] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:10 executing program 0: 08:19:10 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:10 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c803a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:10 executing program 5: r0 = socket(0x2, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$x25(r3, &(0x7f00000000c0), &(0x7f0000000100)=0x12, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc070d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800000000084, 0x0, 0xca}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0xffffffffa0020000) [ 1476.463275] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1476.495341] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:10 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:10 executing program 0: 08:19:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x840, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0xffffffffffffff70) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x800) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x3, 0x95d0, 0x2}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 08:19:10 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c805a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:10 executing program 0: 08:19:10 executing program 5: r0 = socket(0x2, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) 08:19:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) r2 = accept(r1, &(0x7f00000000c0)=@in, &(0x7f0000000000)=0x80) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e22, @local}, 0x10) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) [ 1476.743883] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. 08:19:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000200)={0x0, 0xd9f, 0x4, {0x2, @raw_data="7a96b6fbdf62bba845a52d283bb5a8dd7f85e61011ce5e9f9b04ddb9012500247fbf42196476f3d9503327a912bd364605e0446a5559377e7bf92ef30863951aaa53f7270160142e2eeaef347c1e02f86b9b6d4bb3c26f51d9fbf95a71bcd057022d48177863b1f3c453ffc3707cabc8eb6356a35480256ccf100f0699de633c9c7d1e7392d5322ba8cb887f11ce6b63f76445cc8d3cb45ecd3e2bbac22aea5bfc2abd157b05d12e9e772f0adcf0fa4b686c7272b6d4089d037562eeddd4c8d170f697a243b6f096"}}) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000040)=0x2) close(r1) 08:19:11 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) getpriority(0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x4000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) 08:19:11 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x24, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008105e00f80ecdb4cb9f207c806a01a000000400200000a0002000a0ada1b40d805000300c50083b8", 0x61f}], 0x1}, 0x0) 08:19:11 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = socket(0x0, 0x800000003, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}}], 0x1, 0x0) [ 1476.909282] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1476.984260] ================================================================== [ 1476.991901] BUG: KASAN: use-after-free in v4l2_ctrl_grab+0x159/0x160 [ 1476.998412] Read of size 8 at addr ffff888091de0860 by task syz-executor.0/29128 [ 1477.005958] [ 1477.007610] CPU: 0 PID: 29128 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 1477.014579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1477.023952] Call Trace: [ 1477.026566] dump_stack+0x172/0x1f0 [ 1477.030220] ? v4l2_ctrl_grab+0x159/0x160 [ 1477.034410] print_address_description.cold+0x7c/0x20d [ 1477.039733] ? v4l2_ctrl_grab+0x159/0x160 [ 1477.043899] kasan_report.cold+0x8c/0x2ba [ 1477.048323] ? vidioc_querycap+0x110/0x110 [ 1477.052581] __asan_report_load8_noabort+0x14/0x20 [ 1477.057533] v4l2_ctrl_grab+0x159/0x160 [ 1477.061556] ? vidioc_querycap+0x110/0x110 [ 1477.065798] vicodec_stop_streaming+0x158/0x1a0 [ 1477.070471] ? vicodec_return_bufs+0x220/0x220 [ 1477.075070] __vb2_queue_cancel+0xb1/0x790 [ 1477.079334] ? vidioc_querycap+0x110/0x110 [ 1477.084368] ? dev_debug_store+0x110/0x110 [ 1477.088616] vb2_core_queue_release+0x28/0x80 [ 1477.093127] vb2_queue_release+0x16/0x20 [ 1477.097192] v4l2_m2m_ctx_release+0x2d/0x40 [ 1477.101638] vicodec_release+0xc0/0x120 [ 1477.105628] v4l2_release+0xf9/0x1a0 [ 1477.109358] __fput+0x2dd/0x8b0 [ 1477.112656] ____fput+0x16/0x20 [ 1477.115944] task_work_run+0x145/0x1c0 [ 1477.119847] exit_to_usermode_loop+0x273/0x2c0 [ 1477.124529] do_syscall_64+0x53d/0x620 [ 1477.128431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1477.133626] RIP: 0033:0x459a09 [ 1477.136821] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1477.155726] RSP: 002b:00007f295bfaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1477.163445] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000459a09 [ 1477.170715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 1477.178000] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1477.185269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f295bfaf6d4 [ 1477.192559] R13: 00000000004f9352 R14: 00000000004d1da8 R15: 00000000ffffffff [ 1477.199864] [ 1477.201492] Allocated by task 29128: [ 1477.205210] save_stack+0x45/0xd0 [ 1477.208676] kasan_kmalloc+0xce/0xf0 [ 1477.212390] __kmalloc_node+0x51/0x80 [ 1477.216191] kvmalloc_node+0x68/0x100 [ 1477.219994] v4l2_ctrl_new.part.0+0x214/0x1450 [ 1477.224574] v4l2_ctrl_new_std+0x22d/0x360 [ 1477.228809] vicodec_open+0x1a8/0xb30 [ 1477.232609] v4l2_open+0x1b2/0x360 [ 1477.236164] chrdev_open+0x245/0x6b0 [ 1477.239895] do_dentry_open+0x4c3/0x1210 [ 1477.243975] vfs_open+0xa0/0xd0 [ 1477.249428] path_openat+0x10d7/0x45e0 [ 1477.254278] do_filp_open+0x1a1/0x280 [ 1477.258079] do_sys_open+0x3fe/0x550 [ 1477.261879] __x64_sys_openat+0x9d/0x100 [ 1477.266122] do_syscall_64+0xfd/0x620 [ 1477.269947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1477.275128] [ 1477.276751] Freed by task 29128: [ 1477.280119] save_stack+0x45/0xd0 [ 1477.283571] __kasan_slab_free+0x102/0x150 [ 1477.287802] kasan_slab_free+0xe/0x10 [ 1477.291603] kfree+0xcf/0x220 [ 1477.294712] kvfree+0x61/0x70 [ 1477.297839] v4l2_ctrl_handler_free+0x4a8/0x7e0 [ 1477.302512] vicodec_release+0x6b/0x120 [ 1477.306485] v4l2_release+0xf9/0x1a0 [ 1477.310197] __fput+0x2dd/0x8b0 [ 1477.313474] ____fput+0x16/0x20 [ 1477.316758] task_work_run+0x145/0x1c0 [ 1477.320647] exit_to_usermode_loop+0x273/0x2c0 [ 1477.325239] do_syscall_64+0x53d/0x620 [ 1477.329124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1477.334305] [ 1477.335934] The buggy address belongs to the object at ffff888091de0840 [ 1477.335934] which belongs to the cache kmalloc-256 of size 256 [ 1477.348594] The buggy address is located 32 bytes inside of [ 1477.348594] 256-byte region [ffff888091de0840, ffff888091de0940) [ 1477.360406] The buggy address belongs to the page: [ 1477.365349] page:ffffea0002477800 count:1 mapcount:0 mapping:ffff88812c3f07c0 index:0xffff888091de0200 [ 1477.374988] flags: 0x1fffc0000000100(slab) [ 1477.379229] raw: 01fffc0000000100 ffffea0002425ac8 ffffea0002a191c8 ffff88812c3f07c0 [ 1477.387114] raw: ffff888091de0200 ffff888091de00c0 0000000100000008 0000000000000000 [ 1477.394988] page dumped because: kasan: bad access detected [ 1477.400749] [ 1477.402372] Memory state around the buggy address: [ 1477.407300] ffff888091de0700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1477.414658] ffff888091de0780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1477.422048] >ffff888091de0800: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1477.429408] ^ [ 1477.435902] ffff888091de0880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1477.443265] ffff888091de0900: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1477.450634] ================================================================== [ 1477.457987] Disabling lock debugging due to kernel taint [ 1477.474489] Kernel panic - not syncing: panic_on_warn set ... [ 1477.474489] [ 1477.481918] CPU: 1 PID: 29128 Comm: syz-executor.0 Tainted: G B 4.19.75 #0 [ 1477.490249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1477.499644] Call Trace: [ 1477.502252] dump_stack+0x172/0x1f0 [ 1477.505936] ? v4l2_ctrl_grab+0x159/0x160 [ 1477.507033] kobject: 'loop4' (00000000abd20439): kobject_uevent_env [ 1477.510099] panic+0x263/0x507 [ 1477.510115] ? __warn_printk+0xf3/0xf3 [ 1477.521709] kobject: 'loop4' (00000000abd20439): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1477.523936] ? v4l2_ctrl_grab+0x159/0x160 [ 1477.523956] ? preempt_schedule+0x4b/0x60 [ 1477.541873] ? ___preempt_schedule+0x16/0x18 [ 1477.546306] ? trace_hardirqs_on+0x5e/0x220 [ 1477.550653] ? v4l2_ctrl_grab+0x159/0x160 [ 1477.554816] kasan_end_report+0x47/0x4f [ 1477.558793] kasan_report.cold+0xa9/0x2ba [ 1477.562929] ? vidioc_querycap+0x110/0x110 [ 1477.567166] __asan_report_load8_noabort+0x14/0x20 [ 1477.572085] v4l2_ctrl_grab+0x159/0x160 [ 1477.576058] ? vidioc_querycap+0x110/0x110 [ 1477.580289] vicodec_stop_streaming+0x158/0x1a0 [ 1477.584945] ? vicodec_return_bufs+0x220/0x220 [ 1477.589520] __vb2_queue_cancel+0xb1/0x790 [ 1477.593742] ? vidioc_querycap+0x110/0x110 [ 1477.597973] ? dev_debug_store+0x110/0x110 [ 1477.602212] vb2_core_queue_release+0x28/0x80 [ 1477.606697] vb2_queue_release+0x16/0x20 [ 1477.610746] v4l2_m2m_ctx_release+0x2d/0x40 [ 1477.615077] vicodec_release+0xc0/0x120 [ 1477.619405] v4l2_release+0xf9/0x1a0 [ 1477.623120] __fput+0x2dd/0x8b0 [ 1477.626392] ____fput+0x16/0x20 [ 1477.629662] task_work_run+0x145/0x1c0 [ 1477.633539] exit_to_usermode_loop+0x273/0x2c0 [ 1477.638126] do_syscall_64+0x53d/0x620 [ 1477.642005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1477.647183] RIP: 0033:0x459a09 [ 1477.650377] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1477.670226] RSP: 002b:00007f295bfaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1477.678471] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000459a09 [ 1477.685730] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 1477.692987] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1477.700294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f295bfaf6d4 [ 1477.707551] R13: 00000000004f9352 R14: 00000000004d1da8 R15: 00000000ffffffff [ 1477.716283] Kernel Offset: disabled [ 1477.719910] Rebooting in 86400 seconds..