8d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:53 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:53 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:25:53 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:53 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:53 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:53 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:54 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:54 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:25:54 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:25:54 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:55 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:55 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:56 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:56 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:56 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:25:56 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:25:56 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:57 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:57 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:25:58 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:25:58 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:58 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:25:58 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:25:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:59 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:25:59 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:25:59 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:59 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:25:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:25:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:00 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:00 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:01 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:01 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:01 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:02 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:02 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:02 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:02 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:03 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:03 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:04 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:04 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:04 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:04 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:04 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:05 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:05 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:05 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:05 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x0, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:05 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x0, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:05 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:05 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x0, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:05 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:06 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:07 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:07 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:07 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:07 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:07 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(0x0, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:09 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:09 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:09 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:10 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:10 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:10 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:11 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:11 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:12 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:12 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:12 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:12 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:13 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:14 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:14 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:14 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:15 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:15 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6", 0x6f, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:16 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:16 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:16 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6", 0x6f, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:16 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:17 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:17 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:17 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:17 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:18 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:18 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:18 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:18 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:19 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:19 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6", 0x6f, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:19 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:20 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:20 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:20 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:20 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:21 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:21 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6", 0x6f, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:21 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:21 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:21 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:23 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:23 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6", 0x6f, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:23 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f0", 0xc3, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:24 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:24 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:24 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:24 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:24 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f0", 0xc3, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:24 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:24 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:24 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:25 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:25 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f0", 0xc3, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:25 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:25 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:25 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:27 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa99") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:28 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:28 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25", 0xd1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:28 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:28 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa99") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:29 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa99") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:29 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:30 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:26:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:30 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:30 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25", 0xd1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:32 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:26:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:32 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:32 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25", 0xd1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:26:34 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f0", 0xc3, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:34 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:26:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:34 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:34 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:34 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3", 0xd8, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:34 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:35 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:26:36 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:26:36 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:36 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:36 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:26:36 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:36 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3", 0xd8, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:36 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:37 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:37 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072e"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:37 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:37 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:37 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:37 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3", 0xd8, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:39 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072e"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:39 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:39 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:39 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:39 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:40 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072e"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:40 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:41 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:41 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:41 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:41 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:41 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:42 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac27", 0xa7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:42 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:43 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:43 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:43 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:43 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:44 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:44 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:44 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:44 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:44 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:44 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:45 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449", 0xdd, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:45 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:45 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:45 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:45 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449", 0xdd, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:46 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:46 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:46 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:46 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449", 0xdd, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:46 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") 23:26:46 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:47 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:47 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") 23:26:47 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, 0x0, &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:47 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:47 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:48 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0x0, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:49 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") 23:26:49 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:49 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0x0, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:49 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, 0x0, &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:49 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:50 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:50 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, 0x0, &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:50 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:51 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), 0x0, &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:51 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, 0x0, &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:51 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:52 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:52 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0x0, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:52 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), 0x0, &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:52 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") 23:26:52 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:52 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:52 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0x0, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:52 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), 0x0, &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:53 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840), 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:53 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:53 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:53 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0x0, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:53 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:54 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:54 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:54 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0x0, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:55 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:55 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:55 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:55 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:55 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x0, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:55 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:55 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:55 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:55 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:56 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:56 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:57 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:57 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:57 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:57 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:57 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x0, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:57 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:57 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:57 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:58 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:58 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:58 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:58 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:58 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:58 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x0, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:59 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:59 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:26:59 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:26:59 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:00 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:00 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x0, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:00 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:00 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:00 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:00 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:01 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x0, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:01 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:01 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:02 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x0, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:02 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:02 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072e"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x0, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:03 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:03 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:03 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072e"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:03 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x0, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:04 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b4207"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:04 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:04 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:04 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x0, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:04 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072e"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:05 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:05 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:05 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:05 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:05 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x0, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:05 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) 23:27:05 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:05 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:06 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) 23:27:07 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) 23:27:07 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:07 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x0, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:07 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:08 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:08 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:08 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:08 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:08 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:09 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:09 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:09 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:09 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x0, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:09 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:09 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:09 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:10 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:10 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:11 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:12 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:12 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:12 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:12 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:27:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:12 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:13 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:13 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:13 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:27:13 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:14 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:14 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:27:14 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:15 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) 23:27:15 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:15 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:15 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:15 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) 23:27:15 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:27:15 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) 23:27:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:16 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:16 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:16 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:16 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:16 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:17 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:18 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:18 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:18 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:18 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:18 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b338") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:19 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:19 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:19 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:19 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b338") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:20 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:20 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:20 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:20 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b338") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:20 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:20 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:21 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:21 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:21 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, 0x0}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:22 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:22 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:22 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:22 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:22 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:23 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:23 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:23 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:23 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:23 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, 0x0}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:23 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:23 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:24 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:24 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:25 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:25 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:25 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:27:25 executing program 5: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:25 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:25 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:25 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:26 executing program 5: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:27 executing program 5: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:27 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:27:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:28 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:28 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:28 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:28 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:27:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, 0xffffffffffffffff, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:29 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:27:29 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 23:27:29 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:30 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:27:30 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:30 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:30 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) 23:27:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:30 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:31 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:31 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) [ 2302.690748][ C1] ================================================================== [ 2302.698849][ C1] BUG: KCSAN: data-race in __perf_event_overflow / perf_event_exit_event [ 2302.707269][ C1] [ 2302.709586][ C1] read to 0xffff888138848f0c of 4 bytes by task 11184 on cpu 0: [ 2302.717202][ C1] perf_event_exit_event+0x5da/0x780 [ 2302.722495][ C1] perf_event_exit_task+0x479/0x600 [ 2302.727692][ C1] do_exit+0x599/0x1720 [ 2302.731835][ C1] do_group_exit+0xa5/0x160 [ 2302.736329][ C1] get_signal+0xf54/0x1020 23:27:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) [ 2302.740739][ C1] arch_do_signal_or_restart+0x87/0x2d0 [ 2302.746280][ C1] exit_to_user_mode_loop+0x78/0x130 [ 2302.751560][ C1] syscall_exit_to_user_mode+0x6a/0x90 [ 2302.756997][ C1] do_syscall_64+0x37/0x70 [ 2302.761405][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2302.767276][ C1] [ 2302.769574][ C1] write to 0xffff888138848f0c of 4 bytes by interrupt on cpu 1: [ 2302.777177][ C1] __perf_event_overflow+0x76/0x1e0 [ 2302.782368][ C1] perf_swevent_hrtimer+0x255/0x310 [ 2302.787537][ C1] __run_hrtimer+0x132/0x420 [ 2302.792102][ C1] hrtimer_interrupt+0x36e/0xa70 [ 2302.797015][ C1] __sysvec_apic_timer_interrupt+0xa3/0x250 [ 2302.802901][ C1] sysvec_apic_timer_interrupt+0x88/0xb0 [ 2302.808504][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2302.814460][ C1] unlock_page_memcg+0x0/0x110 [ 2302.819197][ C1] page_remove_rmap+0x130/0x220 [ 2302.824028][ C1] zap_pte_range+0x728/0x1430 [ 2302.828678][ C1] unmap_page_range+0x2dc/0x3d0 [ 2302.833511][ C1] unmap_single_vma+0x157/0x210 [ 2302.838353][ C1] unmap_vmas+0xd0/0x180 [ 2302.842580][ C1] exit_mmap+0x11f/0x380 [ 2302.846816][ C1] __mmput+0x27/0x1b0 [ 2302.850783][ C1] mmput+0x3d/0x50 [ 2302.854476][ C1] exit_mm+0xdb/0x170 [ 2302.858444][ C1] do_exit+0x51d/0x1720 [ 2302.862571][ C1] __x64_sys_exit+0x1b/0x20 [ 2302.867045][ C1] do_syscall_64+0x2b/0x70 [ 2302.871441][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2302.877328][ C1] [ 2302.879637][ C1] value changed: 0x00000001 -> 0x00000000 [ 2302.885337][ C1] [ 2302.887638][ C1] Reported by Kernel Concurrency Sanitizer on: [ 2302.893772][ C1] CPU: 1 PID: 11206 Comm: syz-executor.4 Not tainted 5.18.0-rc4-syzkaller-00424-gb2da7df52e16-dirty #0 [ 2302.904779][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.914822][ C1] ================================================================== 23:27:31 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:31 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, 0x0, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:31 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:27:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:32 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:32 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, 0x0, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x6, 0x1a5, 0x2, {0x77359400}, {0x0, 0x2710}, {0x1, 0x1, 0x1}, 0x1, @can={{0x3, 0x1}, 0xfb, 0x0, 0x0, 0x0, "60efc7d24f947c8f"}}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:33 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:33 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:33 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:33 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:34 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, 0x0, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:35 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:35 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:35 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:35 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x6, 0x1a5, 0x2, {0x77359400}, {0x0, 0x2710}, {0x1, 0x1, 0x1}, 0x1, @can={{0x3, 0x1}, 0xfb, 0x0, 0x0, 0x0, "60efc7d24f947c8f"}}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:35 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:36 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:36 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:36 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:37 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:37 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:37 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:37 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:37 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:37 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629e", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:37 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:38 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x6, 0x1a5, 0x2, {0x77359400}, {0x0, 0x2710}, {0x1, 0x1, 0x1}, 0x1, @can={{0x3, 0x1}, 0xfb, 0x0, 0x0, 0x0, "60efc7d24f947c8f"}}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:38 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:38 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840), 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:38 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:38 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:38 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:38 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, r1, 0xf, r2, 0x8) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 23:27:39 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:39 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0xa, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:39 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x6, 0x1a5, 0x2, {0x77359400}, {0x0, 0x2710}, {0x1, 0x1, 0x1}, 0x1, @can={{0x3, 0x1}, 0xfb, 0x0, 0x0, 0x0, "60efc7d24f947c8f"}}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:40 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x0, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, 0x0}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) open(0x0, 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:40 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0xffff, 0x8, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:40 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840), 0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) getpgid(0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) 23:27:40 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x6, 0x1a5, 0x2, {0x77359400}, {0x0, 0x2710}, {0x1, 0x1, 0x1}, 0x1, @can={{0x3, 0x1}, 0xfb, 0x0, 0x0, 0x0, "60efc7d24f947c8f"}}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8dd449d5", 0xde, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3befa87cc9556706f69811085d7492e056388768091b3383ebf47fa997d") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:40 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0)=0x2, 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000004) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './bus\x00'}, 0x6e) syz_clone(0x40007000, &(0x7f00000005c0)="8c82a0dd1bac065ef0d9a57b068b5a1a844bae25c5272d6b5834846981cc26e50d423c4d58ab50ba64752117e3198a5faa1a9d618545d99d84a064084866fae7b620db89291e34a9df2843085201d2365420f7754a1b236d78e2be5299ed61f92013ef6d328be1b6f07990efab06e6f38fdc1cfc9f2fdf858bc57ee08605f6eb244e4bfc05baebb6f0c52eab4045ec465f6ff5886e7cf5c050335b2145cfed13990e0c56b7ac2729caa8ea687bef6db8839e744f89904373f24de2374c31bdffc9e9f06198d79689cda91ab3664e22dd25cdb61fadf774e3c6bc8d", 0xdb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="d2a29f451ed12989c72c49a655f0b1578292136383c8cf2836280f5aaf508d04edc290833ded3b6b24d03e4d70eab39bd6a90b5956b419f794110e733aad42793a6754ebf3626a70ee13fe5cf0443b88a37010f50f0c13a3") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) 23:27:41 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0xe400, 0x0) accept(r0, &(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000840)=0x2, 0x4) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000006c0)=""/206) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x74, 0x80, 0x1, 0x0, 0x0, 0x80a26, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x2, 0xfffffffffffffff8}, 0xa, 0xffff, 0x0, 0x2, 0x7fffffff, 0x10001, 0x1, 0x0, 0x3, 0x0, 0x80000001}, 0x0, 0xf, r1, 0x8) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe63d4c0d1629efc0f73eb", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="9b42072ebb"], 0x20000600}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0xe400, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x5, &(0x7f00000001c0), 0x4) sendmsg$can_bcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x48542, 0x0) bind$unix(0xffffffffffffffff, &(