ogram 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8f00) 18:58:28 executing program 2: 18:58:28 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast6-avx\x00'}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000333, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8f01) 18:58:28 executing program 2: 18:58:28 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) r5 = socket(0xa, 0x1, 0x0) ioctl(r5, 0x8917, &(0x7f00000000c0)) ioctl(r5, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9000) 18:58:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000000001000000c90c00000741000000000e7564703a93797a3000000000a4ed9f99d9dd23fd088a7711eed3422ef37261006a6aae67ed552847407dd572993e3ad1940950a0141ae392514c4c69a81c8e98cd2c32b2ec103e31616a4340a990ffc1033137243dd9e8e48e9d9515f74bedc55df873549ad09c48cbe6195bbe78c636eaefd29b05718c70e5d4f9d981769635e87770a8970b885c92a3700b86cc9d6501c70731dc107d6f21294de3c7c1984fa0e45657b6461fa05f4872"], 0x1}}, 0x48081) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x8, 0x0, {{0x1, 0x0, 0xffffff8d}, 0xf000000, 0x400b, 0x448e370e0511d35e}}, 0x1c}}, 0x0) 18:58:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000334, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:28 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) r5 = socket(0xa, 0x1, 0x0) ioctl(r5, 0x8917, &(0x7f00000000c0)) ioctl(r5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9001) 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9100) 18:58:28 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x292300) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x8, 0xbd, 0xb53, 0x4, 0x8}) 18:58:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000335, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:28 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) r5 = socket(0xa, 0x1, 0x0) ioctl(r5, 0x8917, &(0x7f00000000c0)) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:28 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @random="0a87e01efc57", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @multicast1}, @icmp}}}}, 0x0) 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9101) [ 3241.483211][T15893] dccp_invalid_packet: pskb_may_pull failed [ 3241.520502][T15893] dccp_invalid_packet: pskb_may_pull failed 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9200) 18:58:28 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, &(0x7f0000000000)={0x0, {{0x1c, 0xffffffffffffffff, 0x0, @loopback}}, {{0x1c, 0xffffffffffffffff, 0x0, @loopback}}}, 0x108) 18:58:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000336, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:28 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) socket(0xa, 0x1, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9201) 18:58:28 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400100, 0x10) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x9cc, 0x4}}, 0x30) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x57c, 0x0, 0x0, 0x358, 0x498, 0x498, 0x498, 0x4, &(0x7f0000000080), {[{{@uncond, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x2, 'system_u:object_r:watchdog_device_t:s0\x00'}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @local, 0xf, 0x1}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x12}, @local, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0x8e9e, 0xf5, 0x8, 0x1, 0x101, 0x400, 'veth0\x00', 'vxcan1\x00', {0xff}, {0xff}, 0x0, 0x104}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x1f}, @multicast1, @dev={0xac, 0x14, 0x14, 0x1b}, 0x7, 0x1}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x5c8) 18:58:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9300) 18:58:29 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) socket(0xa, 0x1, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9301) 18:58:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000337, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9400) 18:58:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:29 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}}, 0xab, 0x6, 0x3fb, 0x5, 0x40}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r2, 0xd4, "c0a36b9771895f0b964f5f456d06911d39c8b02dfb305b315bbdac7af0d3540fff35c15b4d2dc6297af69d0775e2296b3e20ba1638d28cfbce61c8192ce58fdd12e9d39e642cd6a132173f5b0ac8d98f49fb1b7b02c679bf56102ecada49bd1f91005872bd1c8c1d9f97c0ab7996ba00d7bd41a31267824c877df1595ed336e9239e0c38f20ebd6df81c6a12a07aeb0cdc6f0ea76e968e41d34867a21d73a972fcee75f9dd08ab77633092cfc48499a03d0019f89e52e97229898790a0f402909a405e0989139493fd53db30660a0266a5f69840"}, &(0x7f0000000140)=0xdc) mount(&(0x7f0000000180)=@md0='/dev/md0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='rpc_pipefs\x00', 0x2001802, &(0x7f00000003c0)='\x00') sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9401) 18:58:29 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000338, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9500) 18:58:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:29 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9501) 18:58:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000339, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:29 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x1814c0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000300)={0x3, 0xffffffff}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x800, 0x4) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x8, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x10001}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}}, 0x4000004) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0x2, 0x8) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000240)="e0ee4206758e75db726d1a13030d9825d97d2e3b8312176b06ff6378e1e1ecdd305395c345f0420ccec3a86cef2af48a26670511f4b60e24edbea4c69af0dc24075a3455f069ec58be9ceb7b8e89b975c2f7d90ccc348f2e83a0b82dfb44d4870e40c33f03e48b1b3df6b222365b0ed5edb2f18227d730e6ea64e7f1a22ef36de542", 0x82) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0106434, &(0x7f0000000340)={0x9, 0x0, 0x0, 0x58}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40086439, &(0x7f0000000380)={0x742d, r3}) 18:58:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:29 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9600) 18:58:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9601) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000033a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000040), 0x159, &(0x7f0000000000), 0x2a0, 0xa011}, 0x0) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9700) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 3: r0 = socket$kcm(0x11, 0x1007, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x4760e904) r2 = gettid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000740)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r1, 0x0, 0xa, &(0x7f0000000980)='map_files\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000c00)={0x2, 0x8208, 0x3, 0x1173, 0x0}, &(0x7f0000000c40)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000c80)=@assoc_id=r9, &(0x7f0000000cc0)=0x4) r10 = geteuid() lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = fcntl$getown(r1, 0x9) r13 = geteuid() r14 = getgid() sendmsg$unix(r1, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000100)="245b395bac6baffe246e26c548a5676d48fe265950da06fd1b0975c6513106817a63c3d102cc085a4a6fed4683fdb5bc1d0c90037e6d8882e7baf4af12edccea2179c0a20f73eb78929630840825a0abb44441caf5a3bb8b5d4fb48bf48ef03802b97e21d57af1053f664ef9f19358de65a1a0a85b46e2593aabeddc226503ef881c26294a914865aaa288982d1b099ee573db6173a4fd23e7365af89fd17ada070cee4657b8d5de72", 0xa9}, {&(0x7f0000000240)="acd83606eaae0fc7f13c4843b1ffecbb975ba9c6baf297326587233bf25ab33327066e3c28e97660421ef37530083d7411bacbcf628e293b9140", 0x3a}, {&(0x7f0000000280)="76d56fa8c177ea85d716a2e0dc401dc30f5b6becb905b9bb60d6deee262ddd5e7b4d9e4640eb0820bbd0a4f31d5a318f3ff006b48aabdcfcbdda99c76aed090ab42f4e43806d8a9391cfc9d06544ea3c374c1e9a19c1faac60185ec627da78acdc451b1718ffc0a02f9dae61b43a86686ebb37de3c7b9015a09cff67", 0x7c}, {&(0x7f0000000300)="1517c47783ce9abd6c92e801c18ea8ec4a13ee5d3ab4d35bc3f0bcde9f0d6819b54980da8f13e82bc7b803108e3282ea939e0f6edacf463a4a1d6b2b41cf9b42d50c84f24f966b2b3b3d", 0x4a}, {&(0x7f0000000380)="e8e496a2d03c3a1a356efc1902f2dda46acb6342e5eb03f48cb4def1e1e2b57a7e1a6d878513e5661ebbb347a2d367ef41f4bd2915c9d46b95773d6644be48616cb8894d15ed18c0d941156cbda13c7798715ae0acda8a6d8f5e26f43567c6361ba96a1a927b537751352b39234d137053a87699af3785d0776c167d61d3e72274df0bd6f1dc9d23dc2aacd41f6891e0fd939715db43bb4f4621435c2ac0c4c44a7cc0fd91d1a7ffc0c1231bda8a4a1910b2", 0xb2}, {&(0x7f0000000480)="3403dd45a9c38f3cfaedda6dde3a538add16a9894f15202f63eacecae8f35b385a715af071f06853f33b4b27904fd4aaf992c85bfd09a4885b128479ab1581c42217947b7afb7f8ce761cefd5af9918a9879803fce6de5ba5ea69da3ee24fcf1ca2dcd7314d39ebaaa4d2387c4060e30c20d69f87b3dfa170b2c46c3e4c510101e400170bca1272304470bed65dbf3", 0x8f}, {&(0x7f0000000540)="a6e6707f49558a1601374a2a79134f9af0f7df2cc47c849379bfdc235acd6872e5175619198b68cd4d59579bc4cec6a359e68e5e15af83903263c9d87fd623493f9b46cfa5a79d6528f5ee5c81ab61845f9ac6af83eac2496e211a57a6704730745400dda33208af", 0x68}], 0x7, &(0x7f0000000ac0)=ANY=[@ANYBLOB="240000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c0000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="180000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="180000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="100000000100000001000000", @ANYRES32=r0, @ANYBLOB="180000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="180000000100000002000000", @ANYRES32=r8, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="2c0000001600000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="180000000100000002000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14], 0xf4, 0x4000814}, 0x800) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x1, 0xa, 0x40, 0x7, 0x2d880000000000, 0x0, 0x401, r4}, &(0x7f0000002b00)=0x2d1) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9701) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002e00)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x20}}, 0x2, 0x2, 0x8000, 0x3f, 0x2}, &(0x7f0000002ac0)=0x98) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000033b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9800) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000002bc0)={0x1, 0x5, 0x80, {r2, r3+10000000}, 0x7, 0x100000001}) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:30 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x300) write$nbd(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1010) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x2) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000100)={0xffffffffffffff4a, {{0x2, 0x4e24, @rand_addr=0xfffffffffffffffc}}}, 0x84) setsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000240)=0x400, 0x4) move_mount(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9801) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) clock_gettime(0x0, &(0x7f0000002b80)) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000033c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9900) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9901) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000002900)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="df939f3d06ee9e1fe70f91aa150cf275", 0x6}}}, &(0x7f00000029c0)=0x84) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:30 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x4f5, 0x4) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000033d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9a00) 18:58:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/16) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9a01) 18:58:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000033e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) openat$null(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/null\x00', 0x40c000, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:31 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xe1, 0x202000) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000040)={0x2b, @remote, 0x4e24, 0x0, 'lc\x00', 0x10, 0x9, 0x4e}, 0x2c) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9b00) 18:58:31 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x40004) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000033f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9b01) 18:58:31 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) bind$netlink(r1, &(0x7f0000002c40)={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9c00) 18:58:31 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:31 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000340, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9c01) 18:58:31 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/247) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9d00) 18:58:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:32 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200001, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9d01) 18:58:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:32 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 18:58:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000341, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:32 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9e00) 18:58:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000342, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:32 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9e01) 18:58:32 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000011c0)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000800500001001000010010000540300000000000010010000b4040000b4040000b4040000b4040000b404000005000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/79], @ANYBLOB="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"/1673], 0x5dc) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) 18:58:32 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000343, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9f00) 18:58:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:32 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9f01) 18:58:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000344, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:32 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x204, &(0x7f0000000480)=[{0xfffffffffffffedd, 0x103, 0x1, "091abfeedb76ffa8bd6f87f94d1e2ef9c18243332ccb0271dc0a7e77be276b49ee1fe385c311ee55790cc83296b2b2986d184ec291b3bd00aea7c1451cab830f797827cf237cf89e56836dbf54025517cc801b499c06e9112bf0d564703083c11abac4f03087cc9db623c289e896c3c8c7f07f4b7d1a2bd62016cfb69d2039f66a94a447cd89b21f1074601c51061391721a1c0d1820967693ff11446220f7fc40d143fe34d287f90351b7f3bbb0f0484216f04f13db94fabc2e2b9678f5cb2eb792c16bb29e7b3729d500a7fc2b74a02dff8c5d15555deb15"}, {0x2c, 0x11f, 0x3, "58c800e1355893391b881bd239668ad033ecb0c08aa207bbb07da0e47e"}, {0x295, 0x11d, 0x2, "d20342897602f2d44ce515b583906d7c33c41fbd15ea355c"}, {0x6c, 0x400000000000117, 0xcdc, "27c2ee6c09be9a2c75961c44dca7f982f77c5e85c76a494fea18783e84e7cd44d98febc0796c75d22dfeefc824722c5b3499f994f6d3fe1a45ea0c63931ebf4d9a66e20c0240197053eeccbf2e4362f49db6ca0a720401f7eadb505140b5aa39"}, {0x34, 0x11f, 0x5, "9d9e3dfe5a5993c50140b26fe1053ed2e8e4fbc47669fe380929e4137043113fe346e21c54e784db"}, {0x425, 0x10f, 0x3, "41c8a1dc906f19858ceed0623b08960749b307ede250acc42eb561dbd0115367e55b1928959d449110a5145c49118462d6f222443332aeae8b1ea9fe4352fb1d461eec33c276fed2837b8a559cc57807d0e431af23586d749e18c6ec85cbfbc812722db78c12737bc976592002e0c230009c2795d6868ff05fae9e8a227a173951949eb54b5d0b753b2cd195fe057d9bc1d65e997ec63779153241b5f83de7526cedde77cd2660f845db24c462ca8bfe67ae6d7deba5"}, {0xe8, 0x10c, 0xf5, "cf0deb785bbd2f04af9fab206cfcc4c424b210f777bc56330a75e2c96d7b7db56abe1aa3f699ae126ba34445766e55aaffb58967998604a6df07d5fa2ca702ac0ed39ca0649f07b1e3064e7846a175adac5d46245df8cca59c62307e8d0ea998bccd23fbfb70423ac1b4722033324b64252c5c27ca70cb8a14f6cc4f05c275aa18081294470d43a9474cd594bc48c74cfdb1ae9e75157a09ad508afd98f0eca7fde3be0d39aeca60b4c1d70cab604ec54e71ce5a3c2fcb44ca578e79951addb81c6f60fb6056c2dd0f6e292c2936c8b7f1791ddd6c004c5ff66d13"}, {0x100c, 0x105, 0xbf5e, "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"}], 0xfe69, 0xa011}, 0x0) 18:58:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:33 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa000) 18:58:33 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x224000, 0x0) mq_unlink(&(0x7f00000000c0)='mime_typenodevwlan1^^\x9cppp0bdevloppp1\x00') ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000080)) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x4, 0x400004) r2 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000140)=0x0) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x7, 0x0, 0x2b7, 0x1, 0x101, 0x0, 0xff}, 0x0) 18:58:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000345, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa001) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000346, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa100) 18:58:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:33 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa101) 18:58:33 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) socketpair(0x10, 0x4, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x1, 0x4) 18:58:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa200) 18:58:33 executing program 0: socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000348, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa201) 18:58:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:33 executing program 0: socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:33 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) fchmod(r0, 0xcc) 18:58:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa300) 18:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000349, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:33 executing program 0: socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa301) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, 0x0, 0x40010020) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa400) 18:58:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000034a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:34 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)="5be1b93ca86fefb9af4cdbde07eafeb15f88fc278b873d5bb499bd1f2014db6a147133539335d70a5143ff618b3e8d51fa11e78f664effa025c3c6fe66087c77b24ad9c56ac84c98821bbb556314de08e2b9bbcf85e342eb7c4d7ef98f52a3822bcc87888c0037640e0a0170cab607a7bb75bfd1cee62fc5c48828372773b6442670d8bc8b1c4b28f1a0369192b59e20b0f878536cb21031c722fafaf7ffe965a3", 0xffffffffffffffcd}, {&(0x7f0000000100)}, {&(0x7f0000000240)="f34d80a13bcb463a3bf30ef9522587c33b9a8a314d747833a64ada852c0f9da0f515f53a443dd02aa46e6f55ab99de7d48445cc51e595503414c46dbcb11e35b446859161758041e8a5a78322a38bc427f4cf9cca73a330087642a5fac3212fdf11e8a734e0be0ab032054d9b7ac09fa89a556dfce3a305cf3f45630c602ae1748849c4c4129297166b623c6cdf06d2cc767567337dfc4f50889c0b17bfb293f7906e5732703e0fe223b6fd067096b6592536ee3202f26895d5d6eea923fb10cdac37ca98575a559be61ba14e376202f825cbc57f434ca4ab6c7fba0431c1bef107f5503b92e81ae9c8e44cee44cbc0e2ad36de7c2cc65671b6fb7d8", 0xfc}, {&(0x7f00000003c0)="082b252ecdc34475352d8c58253e9069a029a8d0e940ecfb0b6f", 0x1a}, {&(0x7f0000000340)="cb0fe07a6691c49c67062c6e4285e7c9ad51328fc347760ad1797fedc543de0cde7827798bdae1d39545d40fbea7e811be51367d2fa9216a7ee5652c1b9133326457e8c0de4118d3a23cdb33bd25", 0x4e}], 0x5, &(0x7f0000000000), 0x0, 0xa011}, 0x0) 18:58:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, 0x0, 0x40010020) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa401) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa500) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, 0x0, 0x40010020) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa501) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b", 0x8) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:34 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffffcf) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=@delqdisc={0x250, 0x25, 0x110, 0x70bd2b, 0x25dfdbfb, {0x0, r2, {0x7}, {0x5, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xc, 0x1, 'multiq\x00'}, {0x8, 0x2, {0x5, 0x4}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7fff}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7f}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}, @qdisc_kind_options=@q_mqprio={{0xc, 0x1, 'mqprio\x00'}, {0x160, 0x2, {{0x7, "a3c7e5d8e21cb23fa53feeb9fcc4dabc", 0x0, [0x8, 0x3, 0x6, 0x25fd, 0xbbc1, 0x9, 0x5, 0xffffffff, 0x2, 0x7f6d, 0x6, 0x9, 0x4, 0x2, 0x1, 0x3f], [0x1, 0xfff, 0x4, 0x200, 0x0, 0x4, 0x5, 0xaf, 0x8000, 0x8001, 0x1f, 0xbfb7, 0x401, 0x0, 0x6, 0x50a]}, [@TCA_MQPRIO_MIN_RATE64={0xa0, 0x3, [{0xc, 0x3, 0x10001}, {0xc, 0x3, 0x100000000}, {0xc, 0x3, 0x3f}, {0xc, 0x3, 0x80}, {0xc, 0x3, 0x2}, {0xc, 0x3, 0x10000}, {0xc, 0x3, 0x3f48911d}, {0xc, 0x3, 0x8ae0}, {0xc, 0x3, 0x3}, {0xc, 0x3, 0x5}, {0xc, 0x3, 0x7}, {0xc, 0x3, 0x2}, {0xc, 0x3, 0x8}]}, @TCA_MQPRIO_MIN_RATE64={0x58, 0x3, [{0xc, 0x3, 0x401}, {0xc, 0x3, 0x4}, {0xc, 0x3, 0x80000001}, {0xc, 0x3, 0x6}, {0xc}, {0xc, 0x3, 0x401}, {0xc, 0x3, 0xcdf}]}, @TCA_MQPRIO_MODE={0x8}, @TCA_MQPRIO_MODE={0x8}]}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2a981c83}, @qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x74, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0xe}, 0x1, 0x7}}, @TCA_CBQ_RATE={0x10, 0x5, {0x7fffffff, 0x0, 0x1000000000000000, 0x8001, 0x2, 0x4}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0x7}, 0x7fff, 0x565}}, @TCA_CBQ_RATE={0x10, 0x5, {0x9, 0x1, 0x2, 0xa949, 0x4, 0x6}}, @TCA_CBQ_RATE={0x10, 0x5, {0x1, 0x1, 0x3, 0x2, 0xfff, 0x8}}, @TCA_CBQ_RATE={0x10, 0x5, {0x10001, 0x1, 0x4, 0x4, 0x7, 0x4257}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0xffff, 0x6}, 0x1, 0x1}}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xfffffffffffffff9}]}, 0x250}, 0x1, 0x0, 0x0, 0x4}, 0x804) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x401, 0x4) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000240)={0x100000000, 0x5c, "36d63fea4069e4bbee8a66690dbdb295188071380938ddf414c7981e2d2396d7ad07392b55d9eb4d16a0eb25ab7bdd4d813dd4977593139508d5dea46f6e1ccab428e61e656509b7210b993157ff4a4d168ced7f696acaec5ce2542d"}) 18:58:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa600) 18:58:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/148, 0x94}, {&(0x7f0000002540)=""/190, 0xbe}, {&(0x7f0000002600)=""/238, 0xee}, {&(0x7f0000002700)=""/84, 0x54}], 0x9, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000034b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b", 0x8) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:34 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000040)={0xfffffffffffffffb, 0x20, [0x5, 0x2, 0x0, 0x81, 0x3, 0x2, 0x1, 0xba]}) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa601) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b", 0x8) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 3247.602427][T19141] Unknown ioctl -1073195750 18:58:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/171, 0xab}, 0x40010020) 18:58:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa700) 18:58:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000034c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac", 0xc) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa701) 18:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac", 0xc) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:35 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) alarm(0xe13) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:35 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x40010020) 18:58:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000034d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa800) 18:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac", 0xc) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:35 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x0) 18:58:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000034e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca3", 0xe) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa801) 18:58:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:35 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0xc000, 0x100) write$vhci(r1, &(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, "c8f90d64e0cda6d76ecc5129cb55b990c54b188717f9013e8bec45d4bd81afb6b26cd83ea6f7a473baf839f76001b60f69376ca40679893cf0c8f5a304be8d611f4f4c34d91cad934663d0422084eb1691361a53cbc1e7405afbaf12cdaa26033962e247103d82e7f8e7a7fac9f9d3c820a2401f5004c0fcd5ffe1a57ff696d39cd4f189c330a746144927adb82d4f664ea12646250b61803f48204e6270d0e025881b44f6f2e2194298d90e39ab"}, 0xaf) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x1, 0x2, 0x8}) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0xa011}, 0x0) 18:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca3", 0xe) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa900) 18:58:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000034f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca3", 0xe) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa901) 18:58:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xaa00) 18:58:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c", 0xf) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xaa01) 18:58:36 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x0) 18:58:36 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x27, &(0x7f0000000180), 0x0, 0xa011}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x17, "2a53bfff8fc5db7e295144b220228e9fd1891517794626"}, &(0x7f0000000140)=0x3b) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x400040) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000100)={r3, 0x2}) 18:58:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xab00) 18:58:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c", 0xf) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000351, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c", 0xf) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xab01) 18:58:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xac00) 18:58:37 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x0) 18:58:37 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x0, 0x20, 0x80000001}}, 0x28) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x6f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x1, 'ovf\x00', 0x20, 0x7, 0x4c}, 0x2c) 18:58:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000352, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xac01) 18:58:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xad00) 18:58:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, 0x0, 0x0) 18:58:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xad01) 18:58:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, 0x0, 0x0) 18:58:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xae00) 18:58:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xae01) 18:58:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000353, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, 0x0, 0x0) 18:58:38 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400040, 0x0) io_uring_enter(r1, 0x2, 0x1f, 0x2, &(0x7f0000000040)={0x6}, 0x8) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000240)=""/248) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)="c3f732ac9f911f00973e4da453fae22cee000000") r2 = semget(0x1, 0x2, 0x10) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000000c0)=""/116) 18:58:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xaf00) 18:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 18:58:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xaf01) 18:58:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000354, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 18:58:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:38 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) getsockopt(r0, 0x0, 0x1, &(0x7f0000000000)=""/12, &(0x7f0000000040)=0xc) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb000) 18:58:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000355, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb001) 18:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb100) 18:58:38 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)="090fb7f6e210d4e0a87f0240d06a214df51ddcdf8952d0e7defeb4ec3ada363c35b808ca4cdfdb22700adf5a96bebd8abc897b4408644e7ca62456d6f0d0f2bfb9221cddc9c2684fd499e435a1ae3748", 0x50}, {&(0x7f0000000480)="e48ca4d347a07d46e0dc7815b6465e650fc3c2e1bb8ad403973b3fcc18f2773ed228fe2d922a56f9b4fa793413446785bb3f91a261ef43b7c339bae431fc7fba696b3afed1c366abd44a444ea2318a620eefc30a2e264719f3ee9cfce82ed8be006c5266e7e2a411168be09d473216389a67006c168a2604581df7ec15b1a3595df9ee7d77bed13494ababe8b8c60cca49cac1ddc10b9609a4223fb1ba8f8b80cf17594ffe0f0f27daa9da57fec3e246be4f995e90b0b17c91b36fb0f866cfb7e656b6da7bf9331fbfee3959743aacb39ad13a3aa5e316e2cc178d9935ccfb9387f49e248e4392987e2c20d4d50403b01e59b7b1391dd803eb0da1c67f36f66f94deaf14504280cfd33d4faf4ec73f54aacf531521432cfb1361c5d56e24b068d822385e17e56bda2ec1fc278263173d8d96a0606c91f83e1adec125f24f538a70b5c213137acf2ad535365601d7e70a20b0c696a65a21936d3794b26e6149a9b135b114e7d1bccc4957cf22cf208777803d368719dbd811292a4ed7d0f3d1a735f665206dadc974a9ab18d9190459275401cf02d055e8f575a9ebfa2a0a9679a65a11412a1106b0dc81692d6a278b38d65ffe5a4e902f0434dc1c1be3732da200151cfcd7dcda800e2f28fb0d2db867252386535c4c1d0ee9811ee3214891945b35fa6cc275dc4a3210b137054e8a9457a24ee922fd49228ab339de42e1743335d838f46bb8c31e833dc5f1d08eeeed51a4b38fbcd045c1a03e5f9ca56ca31eddfd9f3af420f81835ee98020b272c7ab4b8fd5bce22c4c670ec7f87e30cdf5c46f2e41d0691e7ce2febd180de146b3154321e12e8ad5f04cc846d7e0aa595cc96c4830e3624a0026fe64c4bf9cdc6596c74176d9ebcd554088823e714465e5aa07f6bc9b270d48c0ca35e621b37798de6c698c610b0648dad64904ad598bec2938fffa1c53601bc3fb9f78d2bb46ca4686a644068722bfa9f797d525c42e68ca528c6e63cf2a1458f1479634dfaabc80a01823287fee1329e051c3dadb186166014a0fe122d80b1b99569d6a92d12da5e1c12bc77587e816c71c26bc691ce5aabb0f24df8322524cb640b38a125273283cf37c9a51d3555d2f2edbd589f45d443077f2e88efef04afd998d3d6521f3ef01738441e0a02c52fc387cece06bab46f52dd8c9e61ba42f391c0548ce6bcfdb5fda31e3bde95d3dbd1b250b7d484001003466e54687c32421b34bb4549f9409ceadaa5526220b46335bcbb6fa9359e7ba5d22f520a96031605afa64b2c83ecf141dfd85aaaaeef6bcdc851b16fc2e943a9daab40dfdb3ac2e3ba9121bda3de725a25a6fbe7ca6ff3d36c66ee745d1eda1a7e4b11243f74516e9b4d72e4ba66c9dcafdfc21404cb6fdeec4a571fa1e0be6f21efe051728bdeb7df354206d8db172f177153fa22f55aa48f93e140a6b935705e3dce7d095b02d69f2c9351c9a4baaa0a41dd27365900e780efabcfc72848a0cc0fa6809e4384fbeefbea11066bf8ca5bdb7aa5fed985cdbcb91b68e67a73ea84fab9fb5535d6e0fa8d1c599a1257be3bff8ae88345f62c6f0335001af2d6eef20fd6fffd1811a0c282dfa6c2d5a4c392033e99291c70a1b7d927e968d63e3b25cec54a7b55a3fb38c7e29c24ea577901a15116d007f0958d93b32a88c9ded55fe6694278dedb3c4ea6651ca1171c61bcc2589fe4a8bf2f62c536b78a3aa3f6685cca9cea3a553f1f6533b5cdca92f2871c08e77947fd7555b093d13e5be634a5615097a0116ece400882d0ad88a7573531a044de20ef6e01b4ce00c96c6a16d0dda855b762af5132ba484de50e2399b0c6aff978a8d48029fb6f79de6fcd809047337f6cc66e7a4acde95797d229cbd3530d87b33c49a0399cac7127668098c86e09fa57b76eeea466e62d43459786a6fb52387cc2a7984cc01eeab446c3490c3432af0d4eaa016510285c339ec20eb8972c0c54d00bff5e1b22257a05dd24f11bf32d9dd9f608748e2b462758ee768044d9c710aa182bc907ce9d50933d34059f020c59c398b0e9197a70283ec682f49ac4ff1654af8e8d067bea1cb11a63d0102bd5d226c3f3eba80e2ff727247d9bbabfea514e6f12fb8f0e6954496f6521d9279eea8f4cac1ba1dc16bd2f9cc50c000cfe870bde3620f17844b9f032810375117c7fa104aaff227271df3cc690bcccc572c4aa351bb7212fa56cc029a1e5c2ebee6dc91670cd9bdf29e0a74b7c60535b384adca55bc4a2ed8b3856414bbbb3a5801291f328d67ba2844c3f9697091c682cefb15cfd8285a78de678b5f5c375795b947f9846c5df12e88f6ef0cd8be95b68080e352af011e0f0857c3e8e1d5e17ca50d9cbf9fa482d289072cf38ff6cc1f10623a7b2c28ff611c09b4272703a3f2efde68b13b8e66168afa75279338f8885514ff007b41e1a9562ff2db891cb9ac21727f572106cac3dbfc174ad660faa55f242c87bcc139177063562494b61053a40f44aa8d9dd2c3354abc2700672f0f7a6db25da40cfcb64e09c05fbac764384dd62482cdd850e195bd652ee445b15f6243ed0676f35dafdab82332eec8768afac1aea5581ebd7fd70ffb2b0beedaa64366a3e6c20606c1e84c6dcf1deb0eafc49b8abe56346729b13dfae767d5bf883a102fff4dda47b6cf1b7566674b2711f8e9f038fb7cad38c9c091166bb736ef10468ffc1413559f0575cef8115bf68c82f778880f8d96878c2ae4711e12be5cb07997a0495a6ba548f110b98a6096618a875114b19a9bd39565821e96ec372bcf0a47fd8d3d7d015af72f15ead653e95d3fc515518dc7b4d33240ee550bed7ee922226538d329126439ce566c9593d472ee84b3c09f75ab9cff5ace38d252915e5591f14afa87a7cc791dfc710087e4abb3e8c0ef3ba3ff4a3a61ef996717559d98cf0d532586f2acb763922ff7031e71ce831bc0f7e64d124cf00cfe9ac72bafd1c2ce6e490552b46df64d38ae58c94f483175a0dfc772a4d218ce9f1ebaf710728eecbd7dc8b2c8b4661b1ec8ed87724a6acfe174f155ba8b74713333a2435cac4babbb0e7703f4cc5abf728a661dcba1ad9cc5d215e3998a3d94fd470f7b2a5d4d34d23e564a0ce03fa03c586acf85cfbc1507f382b079425a815b40f3656c9047294d1c036a3b20c4de55ee81f063b89ea45b7e6c06084a0407c4808ce47a309264266f8cc00ca71b22c43678927c85e1c219cba5b229913d5e5d28a4a446ad69b0dcc00091b5412671d1dcd5326fc716cd7fa10112924190a1356998dd09aab46402d0d4fa1f4d05fb0c431338d81ceff0141df962feb40239f31a9c5232ae563fecfa1f56b0787194b30eee7b3ae47c405c310c3a9d708506a467add3270195d5729d96157c6521d385f356f8cd45055cb51e5f5e702dd34a50c0184fcb5f50d1b34f24dc1dddbe6349a9ce9d150b51a3ba687e4e03fff766ae5d20b9847f987f92cca3fe3007494b8ffbf6c416b51ba36949580787f7c79775ebd0a4efa5bf09ff4fba51cbeea8c1dc7252fc5f5cd942a5fa44dd2adc3720858cdd9236f3b4b2c7a10d717bc7321553cb0d1febf2c8a1e1bcf708eaf12839457293291c14262b2c7560feb34a5ab7cee39a2f2b97c21b4b6893a607376fbd6e0908a44ca7c4940afcb26c09c1677b779952f61cceb015e1ca85b83c602b6af6f9b20c6b0a8228c34d306daccd1a6ecf86ff1f40c75216cf6295ac460b46aa7715904cd0cce5b74ad3e8d8a3ab7cf6072c5c59870fc28501268cd04fee54cb4aad58f4919c5258824c10fc05d3b0033153ee9a1e5e7b11c9a99c37191deaacfe10d56e7ed7c9cfeccfbb32ac0a3d2004f7267ff1b5e5394f5a4f48d058c5d86a3ae317469591c911320c20cbee12e660637342ff4a75a08ef0a564dd406fdbf58ec5bfa89b0884411cfe49a9859bb9bafbaaa943e4807a84ed94a70bb95c2f6c6336377d2927aad04806f3f91a915491b04228f8c8392e2ebf25ea411ddba5f8c258f6cf72c11f275ed2dec6cc05b5abeff97c6cdb5c101266f2baa60dc93c0c047ddd36bf32d6857e8a925f5792efa17f8c3e824ccc9be4790f69feda1b6797743b35bcaa883ee6dff44afd6c8d18875c480003e78a65685be68b2a444ca26fa00965f44b73c555e620ac2d55d9510e5dd62101718c76767baf1fb0181db32dcdb62138748e580bd8f04cbf9ab2adbbec8c0052fb2825f0f8fa48b33100d197b2da4d71978b67c6d56fbbbe022c5bdbb123b06c4bf256e760807c4eaf3863b688b34ea2501c38ffa3ccb3429ba3b985b41bdabb0a4ec2eccf6b023990ec3a16dba52f18ec54234738dbd4ae44f4dc2b63275cec88cc90e4385f9efbc0b20740626521deb7c2287dd900f1d8e9dfa8285bbea85398b567097c2c0dbb0dfc8b3289823060118e13c11fe87e71d8232cf7192469cfff6114937c8775838780e86234a89852a877f9015577b2a45991ea5b21a366cd8ec5d3a77a760b726d29eb118ff084a7c88b85521ab7f04c91cfc44bc2962624b451658febae5d0c48b0d04ac05a412b83aa5fb3b6d95bdcca76ed3a1cdcf6e89a8b4dbaa1853657f64529b34c296ccd38b272f9e9d1adf42037180de40c515d441c9c9e53b5bf9a02cd76f924a5c54cbea47493086c96500ea279c79512d19d2d71d5d28beae5d12d48a1ca5b229ab274ca2b82a802170c66c0f1313d5b96d50e15937d8681bc2d742d5f070e7a7df28e51edc2e0591b8d0ea7127ab3b5646c44685119134dee3238c5d526ee1b67435c2d068407c5c58346c7a776ed22d614f08c12f155c6e427ddf78f803d409182e79a416caa60808024dc2298a45d91608bd696b8373fb8d0700f9aaca42862e98e9dfd227a593cd77812d5db1b0c5d6003e89dfc44c56dfe15ddcbc8c99fccd5578ad6d41a7e0da4af38524fd70eec9df82f8ec8c310d825f8221e51754299a170c9622dbeec82a2d51ecc75fb5c2d4447ae1acee0650be240d296b8074a00acc1096282beffd3156363dbd4df45b746c9352af042182cae7db1c0478db65b461b758dbec2d8aa7083caf48e566b7585da9acb248cf0b5481d4858a40b8add2e6075ec78ed423fbe59cff9103acee6c9e4d5395e535ca7bab5726dab2df267b4787d57f4e5d69089e5f25b9942c8c661821f09d5ff09ff667f80de832c0c3bb27913d34bdd2a65391caa12f2b78a3d1a5f887e79bc396c51422c1c850dd62c4932a4447fc93918a2a02827f66b5c7c0baef5a7695e78044ac403555f6d5b7c6efe17a9bdd4c347361132d4d4fd235fbc467c2e436b80018535879a96e87f519505e120e44085c531c7d28d3ff4dc1028674460ec93ba5eefdcc0305c668003f5dfdcf02586e0a19da2051e695e2d7eb50e26994e210c0c1bc643ae9c2f20613ae128f8d1c99de4e7255afbdd2474aee5d169302f44092090b5ad7e40a7b328be385d94a5062ae4e57f35463cb06cd8113b0d04302eacdc327bc0c91db5f00ba57e697841baf9bcb66d3f49f2bdff9f85265e5fd3dfcba7cdd287bcb6bbdd7b4b3bbd91b1d80616662760b20beec2e149d80c9169cd8957d9567bb1217d257ccb7c3d4b6ed2d7b66af86496d04a624270a183cd67cda76b5178855f1601c29fc838a589af2f13fb5b026b8a328233606cfb0118ff74c8eb153da0c302258ea6475687d8c8b3fc10265158204ef489dfdd6baca9682409563531628f216867b5aec65466db45d081d702a29b4b58b3f007de6dc944faf4dec76b6dddd7f91b02d64fd50aa3cc3eb0ab542", 0x1000}, {&(0x7f0000000100)="b1bbe596a7fe1bbf2a1c3ed1933bc612fce161fbf3386ef0bc6bc05bf8223799cd507705c432c851a020d25b815ed5d76b109a92aad8fc33ff1b24f965795a8536d46d4da9959ba59d7982a683d76c7b90935ab0aa41d22bc7a3", 0x5a}, {&(0x7f0000000240)="7160312315355e606e21ea28d5e33be7004cd86bbe141bfc4858eac0d47a1a94f8bfbf053ff6190b59b9ecb8a927bed560fc4c2a216bafe0988a33e5e314143c41e91dec83421e7327b78b92e8a6adbd0eea64ecdf5d980ce5cf629d9f207cf50937a9c52a905cfd5019502104d52527ded2e1510d30281b01c62913cabf65d6958ea8dd47354946dbdb5534", 0x8c}, {&(0x7f0000001480)="a5801f896d522ee2f881bae08323afffa3032cafb48d749427e287623cdb3e632eecf7bf50ca0c44a9b543231b7d39bcf9673b14d4fe67d5410202aa96ab688c5efee9a09a0cad74d5c78b365bb9fbf3ad67f4b8af56617dfb3ebb0df3c1d888344f3c4d8c4a827fdc36b23584ececd85640a9b4c67ff07143ad3512bdd1af1d91717bdc63aef9ba37abbe8399772cd6904acb53a6edd2c5eb404a42b883fc372626d41fbfbf96dcb18f746887830ffbb3758cdb462274d194ded686ed61c03d8f07ada7f5a137fef78f4537ecf94a1db9deccd692007dde622382a8f71b3588370820090192e15430b33e46cc88b45b6f94e2780579184965f17da0a0c8e248bbc7f5abd2dacac0a1e0cecd95ea51db1648a943c07421dff38779066f3577890bd425859a1802dd12b36ec6233e4154e533db405c4ea1c60e3f3783b87ed04fe4ec7ec28f2eebcd1cafb65fb3b31b92b513b474df9a8a93516a173a844730b1d18be78569dcbb5ecea57a7ef8fd761a116ca9ee0871e1297ef7f6dc51c2be80131d53a695277ae4aab29df17d7d2da73fc90b482cdbb4beec00fc5ea46cd3ae3565223764407f7d9de7734a5ddc7d61b181ab0bf32d0c3f714c3412e20a2a92d21ff01c6fa1d21f1266099d2aaf1b4daef038d0bd2aff976c197a6e0cd034311d05b73895a71b7a27bb0d427c7235c980f6c72649f7acecadeaa0f6eff44789bb6be10c9a7128f8e1ef246384b5dc1e8aa5e5e22f14f83ee7586c61b53b970ee901ac95221e0c2ec5c2ea17a68fb16c93437eebaf2b74002e2b0490caf9636832b7152d4d8d76bdc7d4694a4d78e4a7e473945b0ac47731a8f704eb006711c013d59c21c70e7c82150b4b9a5d3347d4b5fd3b9b12de71e2415608b7593760a507082cf9b914b68adfc11b115a8b7eb7e74f3127a4fdfdbce7ac5c349de5098ba52869a555d9508985783757179f5f8016291ed18ec5be7bbc58f5670b3664b2b0eece385676ace9762482b9ffcee280d37cd3b79c5f1216cc4879c66fd9cdacbe2acc9c7fb6e537432a9c13e539a6c47ce9595d25686c07ba71fdc5c678aa5cf0551587e5dfd45d7b2253277affeffaff4846272f0f43bdd6b77612c544f36c26374cda836612f0ce2c90585aff5950edb6d73f95a0fd6f51486ae232db17e975b44d7f7d9080a5b36c72d0187f54d2fc14301ba665d7dcae457509132fc09f6ed91f6636d484191277c599d552422709bc185d95e9ee700a8f12bad0d4bd53a8db83d6b415bb8396af1c2cf59a8b46d8e24989475adbc4c91644d3902bda63a46511c05590ca1a6b9e0b10e7b878bf9e599d493fe06ca1f39cb2bb9f4851300cfeae87ad49248c2036d6ed648250761e5adcd7aa37a02be16c01d47bbd4ef69e272269de1644bcc86a3af7449c810c75c973f8783475d2383f88417fb8e8dc2a9e20bd9ea5e50aef2ebb5ba244da5cdd9c6109b4f21e46aab0353532a491c21af064b5c8012e5623df55a1c2e091a15c5f080a0482fe7e09489b9c298f307656a4ee6de6b11a242a5f8be75467a498e03dda9677297c2d8f546361c46009103ddd21cb8dce5db9ccd3a8f9bfef4e4a4554bb4e7b2f136c727ed87bd56d612c28b6513b7ba217b432f4a6b84a8241509627c732012815e9af9a40e7255903bdfeed109617be18a2993261924b75d2bed739c11c85cdc1731270890c78f9798c953b7b6458bc6282ad3e3710efe71c072e4799c1651e2c65e229ee3024c527587f4b5395ec60c17fecfc7e5b5ffa753645cf4ec767dcd22b69259ed7dc4e282734df6fc9d2c9bdfa4a6f97a0e1df39ff054870ae825c20a162e495c79107f68a4aacd4b77f61dc956a2c6935041425653feea70115db17fb9f9da6c57b8f8c4fcc29fc88c1eaba41a9a65b80d6d054ac60af0114d653b8d59628255160ffc395eef6c4c0754c87f850e27bdd60b45b0858840551dad08c347142e56d3eb25b7582912e3fb58d1fe19902d7337a2ebd4ee200f5e7dc791169fc9dd6d893626bb705e3a645c381cdc956216a58667a2c00d22e09b6fcee9ac7e80e3c74c20c154198f6a0f8f00ae7d4ebd70a5f5ebb218249ae98104d462c6d11bff908e5ac3ac5e3b11d4dd720a2c215ff55e3cbb00b003ac8d49bf0c7258b9531cf0f87395e1a9c5790a45731f63ec97435868f550ec681d228afa93f6bb197fc2a36e8331045fdb4cf1df8a6e841d839d2fa49e27d15e427837eef1f8dbd016b00e5f2530ac38c625786175998e065d994eb62fc9b0219402274bc36bcf28031e7db38beac7e4b816c9fb9bb5da7045183c7963a5ba1314fff79b2939231a88618ae81f27775f9bd3ace530927b013c7e3a84ecf54b8d48b9b33c2b40c2829349f00c3aba514f2d06edc98f69d3cc987852b4038fb4cf4df791e6f40af5d1db9832fb96f8b69ddf4fa968559a8669a9108fb6411575a9553451b2704775952c452dfccbfe74a399aea14b265fa5f61b778438a26fdd0ecaae41f76ec0a515c55e77a3dce6d0aee4a5eeb5a096abebef7c41b8459f835535e73157219a508ae5380ad8009e2a401fc37806b0cc118f0cf0d1a1e053a3f8d9676353c240ccb6ac669f6c0713afc6038bd70deb09e7ab980c75fe0688a4f93db2abe63ea85010504b071398b24d0e18909f43d7a30066218d2c9ba72bdb2c7bb2feffcda5dc08c991915cf8cc4a64d05077edb8f29fd5d12bb1cc2a658b663a0be50a96b04c64dba8d5e37db1f20e1d1135d1d7cf6b6ce85b575d1175805c3f3e5442f50cc3364efd9e52b04cde942b9a0ee6af63800409996e3e41478e4eee345d566118e19a980fe46adc086daecc492fba946e6105c2af7cd0e8a0dca4a2e82c68dc4cff7fd38900ba6f6de02b493efa7a144b66073c7ae4ef569ce4039f7015ad9f5d052cdfa6c8628999b902cf356642059ed90e0b9b3df69a18b2b529a0c85c79879d3d8ead7f2c658cb1df0aae44d55dfe621cac0aa35a6cc7175c434d4ae38033c34ab898f4e993e8226a7237f82f05a284e763b8b40c74851a5a30a38b233a92cc8038c4fbbfccbb7ba6797d92896e51c36f95e9462f74ca2a9ced183f69e684c2b695df7ae70cc6ae418bb27d6a9424b6a9fe2a5ef5bd3dd39600346cf93d96f77e8b660ed337d96a48630939eff8df8d085e8b76f1f87a5fe3842335382fc27e186584718d65b8a71a129b198de8ec1a1e08d284d1601785b6588f754afb66e0f45fb2bba79b49fff9bb80b1abd2a00987e8264d043a142d2e22db15ee751a2d31af6f767be80d3ac34338d86b4815b6ae4d6f6d09780f330e3710f7d6897b340543399809e50ebc5c63caebfeac1f7db8b502e6119c329b7c8d4ca5b3a60314377b23ae70314d65fbf22202eb7a3c2fa2b70a513a89174d6841a39f29b9563d7a2f6e90b4aa9ec53a1da8aa4bff5c11d9710a66dc0370a4451decc164ca2b086fc635554d4324802e28b4262a73ce306ab30bdd816fa1cfdc043798ac02f43516f5053df7b7fa4bfc26af88449c4dfd18fba7f1b60f1305e5fb6208f795d4d846a9efd86fce42df3033fc10ee2abf984f3417509bf2e11ed1260795b03e3540f5c6deb602835225a2c78e515d1a56c3d95fa71fcd2d1ba62f380fd3b6b895e648857678fd5108a858c821c1b541f51e26db0dadb7c3664c18f7a08f498429b05ebe21ca4901e5adff4766cb8c34ea8106b4c00a70aac1b36f348023b83bab8f4131b5bd457f7c6de4ab77c6c9ff0c1a40b25003050d2550f57c17df92387f590f597f6cdad4321a0cada7e594c8926439056d552add6d43feeae5f523c38c89a076e026dc68b55faef362b22f633c47b46a798fb2145a70d37b6397a66e3718e8f3a7f57169921c4203fc56ae4e97eb98dfa911b28cd2447c9fb1d2b2d768ce25ede757ce617ac98f539deb674959347e3fe01f5d29e8efbc587365f772ed763e2ebefe5d629132aa83937239d4f4ef4f1025d4733066f835e734878ef401c54f3f5e8a47a68764193871ffdc8645ae44d3fc787167a0fc3c7bfd59f187b01d83ab4c9b13606a806eb4113e7825ae47c92143033a6097abf68eccb1b6e325eed0c9607795ca9abb6efff63c0668353377777ec9f759acaa80bfc1663bd41c4db9b038dbeb0247e8942e447317b7ff2da66ec688e4da1740511d958e7f0ffca7a7629d674a3999b9b7b9c6d4a13341353ea35d01b31f0431ecfba91668327773b2d818f9c10f7a5673057e4f01d28dd9cfe354e27e88a70a5de5932610047c020b07606dbc41420c62154a0dc20ee9324f3054b36b4f05cfe76c2502b59251c90ab3853d5271ba0708707e9dd9c5a348293a0c406e0f327d36d22c3f752e1a0bd4544e1d9c6d7c532ed56f7923cce12ac0e73114895aac6d6f7b417985a16e8c4834bc5c36b446e120388cdb74b1200f519afbe88df48f4ba66649d16cad76940ea7e745968c863a7384d019dc1da6ff4e87d93d94b160c9f36ec3ace4ac5e8db8fdf07c1b0001f562b28176a820f23318c75de0af515e50e044bd8e0741784ddbd8390f9ada881697c7e921c36981035c777d1e120becf8fe37ed8f004cc29276e460a2813f7ce8ed54b26315744cc82612eb2e06e6507fc28ad51077713b8d334f502fc6b0a2a3a805db37eea268b517686c9b3b199530f7481a6dc15e9889a93f57212c20aeb4c34a2e5465f1da063374434741bcf29d826c0824fc00de9c4bd13f7da9f01b84713338da8e1d09b2db8d6600aa6eb1e8f2d0a822408c9b1708a84f0f7604243bc0fd66a8c2eed5dccc385409861f940339a39e844e62275e2e1099595b2f3739cf39e883a6618cb5a4348c5a85fd84bc11a80c5f0dede2e63e9d0210d42c257a02755e90332a4a9351a56661e3cbfc4e71500c72fe684e75ee6552615109d1bd15017325b3a599316f2edb636022768e9554899004e95851ccbcef12d8bcc74bf8e463e3e745704a09f5be580c2dda0da8aebafe4731b1f6786efed6204edef4ae070dfcd8769ed1fbf9d84509ddf103c14d945a37db4a1027a4dfa6c4c4d34cfabe2cbba11283c73d06311a3020628bb06c608686dd659cee5c6e0446cc036592f0bb09f789eaae8f90c3ae06510a796a145948df0a2f14ba4bfb2241fc7b140e3cde7a3139beda575d6bba5e8bd40b97f5f02c3b14b7e0804165b68b40169c73a8416849f1aa40883a50f7589d9c7e1bfb795da1c06d6109f24218c7f250a3918111302bff08a3dd6fb19b7b809984f543eee44191b692c81e019d263aad2c770e3b81342e679010ea5de065e05578235ed2efc32a3997d9567461fff65cea03657e55bdbbe896e995ea73d43976cabacc91488035d32937fa71c9580e233cb02a25631f3974dabdd65fae277eafbf495b95054e40b47aaa24f9631f81e488dbaa7f57c3b8dea68794c2e1a2a1cdc184d83d3cf863a50abb9da8b249bd094fe072df860ac3a59bbfc97a74faa73bd5f07801328b33171deddfc08a6ea904b27f454c37fb47bf368d26d7364be73d626c189aafc8c9b35809ae8e87db0d409745b64a661e152aeb64c388b7638ddda9088bcd3d69188df621b7a7faf764121da144c5f77abb7348fe7ff2ec7779eb537449a351bcb716015c2c7f279fafbc5a825bfca1c3276e72cb2c1797bcca4dd6c0058289e35b7c95a0aa33a90fad1a14b20be289415fdfedcc65b0fa6f74b27e921fc48c3390a21733ebb6ce9ff9b38930096cc472cac934deae6c5595445c949cccad23db6dbf53301047a0b7f93bb4b", 0x1000}, {&(0x7f0000000180)="8bad78223a985986985960089ed554a74311c1aab6", 0x15}, {&(0x7f0000002480)="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", 0x1000}], 0x7, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb101) 18:58:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb200) 18:58:38 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='load ecryptfs trusted:[ppp1 00000000000502303774 w5uw\x00'], 0x36, r2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000500)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000540)=0xc) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x8001, 0x8140) io_setup(0x1, &(0x7f0000000300)=0x0) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000580)) ioctl$TUNATTACHFILTER(r4, 0x400854d5, &(0x7f0000000480)={0x7, &(0x7f0000000400)=[{0x3000000000000000, 0x29, 0x4, 0x1c0fca7}, {0x10000, 0x3, 0x45, 0x5}, {0x4, 0x5, 0x5, 0xfffffffffffffffa}, {0x7c03a9a5, 0xe4d, 0x0, 0x2}, {0x401, 0x101, 0x5, 0x6}, {0x1ff, 0x6, 0xffffffff80000000, 0x7ff}, {0x200000000000000, 0x800, 0x2, 0x401}]}) io_getevents(r5, 0xffffffff, 0x4, &(0x7f0000000340)=[{}, {}, {}, {}], &(0x7f00000003c0)={0x77359400}) accept4$unix(r4, &(0x7f0000000240), &(0x7f00000002c0)=0x6e, 0x80000) 18:58:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000356, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb201) 18:58:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb300) 18:58:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) 18:58:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb301) 18:58:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000357, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:39 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) sendmsg$alg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[@assoc={0x10, 0x117, 0x4, 0x5}, @iv={0xd8, 0x117, 0x2, 0xc8, "8c2eb4e6ac97613e47fd55ca5cbebb57c269d6d2f8b2ab79ad190f04221b5eb829e1711eeab358439f495be1367dff7144c038353e4af44a2b7d8b673a12c9f449387f13d28ae3ae34075c89532d5d9404ecb27d8bd95f29a76b990c8790934a03be0d1cf8d25cdb156281ce7ab1bce511735b964cc0dadf010e3691905246cfa45c625c7e40313f2146036dbbf25fb4d859061e8c82c794b1c65fd393bb288743bb3583a49fe970702eb833ed7184430191e66f8da665604accc0d5ecb3141b9841db04fe87f579"}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x3}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0x101}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0x9}], 0x148}, 0x20000004) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb400) 18:58:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:39 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000358, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb401) 18:58:39 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:39 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb500) 18:58:39 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x401, 0x9, [0x8, 0x8, 0x80000000, 0x9, 0x1], 0x5}) r1 = creat(0xffffffffffffffff, 0x28) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xffffffff, 0xfffffffffffffffe, 0x26, &(0x7f0000000040)="34f3d8fdd72ce242625f243ca4d355868576c37310b432659da677ba03c010bbc3f9fe9c7372"}) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:39 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000359, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:39 executing program 2: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:39 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb501) 18:58:40 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:40 executing program 2: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000035a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb600) 18:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:40 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@caif=@util={0x25, "61a746462bbd3ea103694c49863f604b"}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb601) 18:58:40 executing program 2: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 18:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000035b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb700) 18:58:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) 18:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:40 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x53c, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x8, 0x6, 0xffff, 0x3615, r1}, &(0x7f0000000100)=0x10) r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb701) 18:58:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) 18:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000035c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb800) 18:58:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) 18:58:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000035d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000000c0)=@in={0x2, 0xffffffffffffffff}, 0x10, 0x0}, 0x0) 18:58:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb801) 18:58:40 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1c) 18:58:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb900) 18:58:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000035e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:41 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r2 = shmget(0x1, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002100)='/dev/vga_arbiter\x00', 0x80001, 0x0) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000002140)) recvmmsg(r1, &(0x7f0000002040)=[{{&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000900)=[{&(0x7f00000002c0)=""/189, 0xbd}, {&(0x7f0000000480)=""/235, 0xeb}, {&(0x7f0000000380)=""/141, 0x8d}, {&(0x7f0000000580)=""/135, 0x87}, {&(0x7f0000000640)=""/160, 0xa0}, {&(0x7f0000000700)=""/233, 0xe9}, {&(0x7f0000000800)=""/132, 0x84}, {&(0x7f00000008c0)=""/23, 0x17}], 0x8, &(0x7f0000000940)=""/110, 0x6e}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f00000009c0)=""/170, 0xaa}, {&(0x7f0000000a80)=""/151, 0x97}, {&(0x7f0000000b40)=""/155, 0x9b}, {&(0x7f0000000c00)=""/92, 0x5c}, {&(0x7f0000000c80)=""/88, 0x58}], 0x5}, 0x3134e9db}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000d40)=""/232, 0xe8}, {&(0x7f0000000e40)=""/157, 0x9d}, {&(0x7f0000000f00)=""/208, 0xd0}], 0x3, &(0x7f0000001040)=""/4096, 0x1000}, 0x951}], 0x3, 0x12140, 0x0) rt_sigsuspend(&(0x7f00000020c0)={0x5}, 0x8) socketpair(0x4, 0xf, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000100)=0x100000001, 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) sched_setscheduler(r6, 0x7, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000040)=""/106, &(0x7f00000000c0)=0x6a) shmat(r2, &(0x7f0000a00000/0x600000)=nil, 0x0) 18:58:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb901) 18:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xba00) 18:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000035f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xba01) 18:58:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:41 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "b5d0f9736ada46512d5483112d78676e42e02579a553609bd6e7b3faf5659c34f6922160b4c3f2fb3ae059858d4a8d39042a4ff4a9cb71956acb0ac9a13fba790209e6a3d6e2c60000a46bb139036a26a56ad28cee7a35573962155e7b9035e496ee873eef63a856aeca781501913d5e0610f0524c5879fba7ea3771459debf64301741f8aee140f8889b203fbf4ffffff7fa35b7afb5b9b02d06c1ac32aebb04a93f54f04ba6c57ac177055a8df11c41cb4adc9f71a4b08e3263a950003fe8858a2534b969dcb0d36f4ff51f572b5b430d22796914b23cf87a06385b20525d4c7e663b30b4a2add6ff59ae875c27e0f431522099a6c24370bf2b8b18338a603c7d144b7ed714f32648ef5441774b2bd7804efda68cfb6e1e246ea09f431d375fcfa291f1bfe09a7e84d9f7e13db9ce0347265d6d76b6d5f1101b03bd34f708f8b195de18856c7f1"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000360, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbb00) 18:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000361, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) 18:58:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbb01) 18:58:41 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a45352, &(0x7f0000000800)={{0x20, 0x6}, 'port0\x00', 0x59, 0x40, 0x16, 0xf2b, 0x3, 0x66, 0x1, 0x0, 0x1, 0x6}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000780)=""/27, &(0x7f00000007c0)=0x1b) r1 = socket$kcm(0x11, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20401, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000640)={'team0\x00', 0x200}) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0xa, 0x4e20, 0x98, @ipv4={[], [], @broadcast}, 0x3}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="6075e3e935c4b697180e27d0f2acd7d1c5454037ee5a94e7cf4202a9ff672d2426afd8c3b61259422ed12a6fce053040ef747c6a4f03d922b602a276c501471fa622e4004356d9b123c43127721d552dd57736e12429c604d87069fc7965327a960d68081abcaba54ccd8eebaf0fb026c77378ae0bf2c4cc9b3c3b14b411c6b74aba882b0123a647134b1cccc721d6f443441fd0e7", 0x95}, {&(0x7f0000000240)="11841c96e06ba454dc3c744e10249ee0b62830deaf9629fd2f342109e1774f244725e1309ae3d4816af6d6c59f30acc342709789c4a59f14d8f0f21fc9c6bb077e295f5dc649c9a258642101a1c699fc667e9bb9c5bd6b9e4e85b1a867f5698f0a414bc901d956a46e8618f77786c3ea48", 0x71}, {&(0x7f00000002c0)="5b6730725780bf70093a7f3b0dfa6c9ae904713a49a9168d1c50dce1b613ac92cf554fe5a33c2a00e7d25cf3855483885ff5ab76a1d20cbea5c6ca6fbb65fc73e38a51e20e3dbda6021963daae91b8b0ac9957d05ccff2ade10b70d5dc817deb1bebb9cc568b2f787449540919b3b0d15d89c3228b8ac2d89a500012e008e79cba6d1b9e4086a8ddf1b98652d6f68171c21834ba398bb7d5f2c460608f863c0fff508704675002669da1", 0xaa}, {&(0x7f0000000380)="3c0d5f8f5e3692428e764020792291f70f0e0e6531dc7c6de297714b1a8d22648c957855dcb4cb0ee62c2bd17f61cc32eaafda0e890b0f759adf259b47597638004996847f90ad66eb95d7b2b1b0c9204069faf77e2e3f664debd7b5dda2d038677cc055c26f5a694f3aa8190334e99a2f27d43e0a0011e5383ba5", 0x7b}, {&(0x7f0000000480)="a927bd071c5a8db5126331571ef3745fdd1c45df33c88bd3832adb065aa3110c26fe068078a2611fb157f126f26ab8b07ce8d661aa5d846a1d169d06e00875f34018de2b7d534910df7b2f4fe58bce8c83db44227ed78dcab39608", 0x5b}, {&(0x7f0000000500)="7472b615827fad9e028dc2c12487ec34cb6ba916071df48e18460a32706ddcb1c2a1da8a5188a37731ca1d12cf591d234846ad450927bc6f4085fe06ba3d8133e446bdcd3323c31f2ce92736f60d9995f261a16d80585d9a2bd0f7102db7147f63f073504e819045b2dee84ce9e8ef493a27109e69dff82dad7cbfe188f4774f01d5f7ee017003decc0098363c128a0862a1e541cff14066f4d7484b5c6e046fd40bb213f98cee1e07ad59750639dc6cdc29c128c376cdd9c52c039815d9bf145c036a1e670ee00c1e30420943d27de167fc555117b1dbdfd3d37732", 0x39f1286186106f58}], 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="3c0000001701000091060000b41ca52f37b8e7c111d75ecc827382036c86a3c79a1b12f69b007eca890598a51a3acfb8ca8de600"], 0x3c, 0xa011}, 0x0) 18:58:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 18:58:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbc00) 18:58:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000362, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:42 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbc01) 18:58:42 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x32c, 0xa011}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0xc000, 0x12) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000000c0)={0x7, 0x0, {0x2, 0x0, 0x3f, 0x2, 0x3}}) 18:58:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 18:58:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbd00) 18:58:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 18:58:42 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbd01) 18:58:42 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000080)={0x7fff, 0xb24, 0x7, 0x200}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7bc10f63, 0x800) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f00000000c0)={0x3}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) 18:58:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000364, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbe00) 18:58:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbe01) 18:58:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000365, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:43 executing program 3: r0 = socket$kcm(0x11, 0x10000040002, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x24, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x20000000) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbf00) 18:58:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b", 0x8) 18:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xbf01) 18:58:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000366, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b", 0x8) 18:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc000) 18:58:43 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r4 = syz_open_dev$swradio(&(0x7f0000001e40)='/dev/swradio#\x00', 0x0, 0x2) r5 = fcntl$getown(r0, 0x9) r6 = getuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b80)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000001b40)='\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001bc0)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001cc0)=0xe8) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001ec0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000002080)={&(0x7f0000001e80)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002040)={&(0x7f0000001f00)={0x108, r10, 0x14, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffe00}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa02}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x7f}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xfff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd8}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x8050}, 0x20000004) fstat(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)={0x20, 0x25, 0x10, 0x70bd29, 0x25dfdbfd, "", [@nested={0x10, 0x90, [@typed={0x4, 0x52}, @typed={0x8, 0x30, @str='\x00'}]}]}, 0x20}, {&(0x7f0000000480)={0x13bc, 0x24, 0x1, 0x70bd27, 0x25dfdbfc, "", [@generic="d9ff2bf77f71681b5fb23c97408bd605f816570f27bf07b0cb940b5d60d2ea2139baec88f8ae6b12eeea100c63ab2ef15ef515cf08f16ccd498f5d3988bb5d963dcee079e3abb257f79698159064e669f43e7fea9f34e7049c4bb35c63d621c1ef229c9411c2e9e78879ace3f996ae", @typed={0x8, 0x42, @ipv4=@broadcast}, @typed={0x8, 0x6e, @uid=r1}, @nested={0x1324, 0xd, [@generic="26fdabd7fa01049bdc10289cd8742603467a7a964ca39da4d32d6ca76af6d810d419038da3666309ddf8ebd1ed16ba9ad59742136b8b00f1c462290d0f3ed7c5b299ccffd853c3989cec11579809dfe8b03aa0e4a2dcf87f3c5a891d0514303a44c4f99a4bc49ce310a8a1aa386df20002e6257c4eff88b5fdc99ba50dcd6a6c1a9f9242bc056639b6549edc9f155f182a1b8d3231fdc5e54fdd3f603b0bbf510b0768ec7caef017fe073b773deaaf6a5a98c42941527a22f27b83c4fb15678b7071873cc9fcdea1b8c6c1afc052", @generic="b1dd20cf32af7bb89c9604ccc19f4b2e010485def3cddd8214ecd365f2e1dc9932d8c8c25129ef608aa3853065186d8c6ead7d271a6944e308d0fd77625b843232dbf14e094ddb8ca7b293237f3e5057615f20d3daea59b9f848f8e83d56aca3a7bc83b08e64cb82e2a6f90fe98c51146ecdb442bbca14d74ddcb655c642e11c5ebea93e21cd114edfc9391328be6b3558fad3bd218b7b6382bf20bbb852ba4ab6de037a1d6dd702098f1a15a405c1d456d67c1b6c35fc40e12a83cdf2db1737470a9678c622ebf02d211f34d3", @generic="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", @generic="bb6e375d3a6b3110ee6c3f54456b00cec132b212d1b172ce39f68b2708a4a32cbfd3c68b3accd6954badeb115a1c2ddef75e38752928bf14b685d3ce2e71", @generic="f9a3b2f9154d2601f6c531f9e920168734dc07aedc420812c417fdec07004acc80cd5425c7c50cd63f49071d7310fff85c56610ea642e62b9e7fb8cc", @generic="ffb7d0b37c37f992c964762b743a7eace5a1d276a5a14c1b510659a73091bc7159ffc4dadbedce4d96953100b3b31479e2e020fbaf87511ca5567f084d16273eebf6c90e5e06e7e21f8cbf33bc3e5603fa56fa7eb3a70d998f3f4c9151137f4ac22fa0fd8d06c45ebdc7689d331fc8cfc7ba23369a5897dacd5965c326851bdc4d7a830ed7777fbbde145e033678122533fed2d89f7b9e9b7108ba6c05126a0d360b0d2b7f662903f70f045880199f3b460ee061c1d1dbd5a0b6044dfd206bbd5dba857569cac02d5cb66eb8ed139e9c6dae5d87e34069a4f09f07d8ea0de3333d34da5caac1694e0671401d80d9d117bd9d8da50bac89aea5512ffcc2", @typed={0xc, 0x43, @u64=0x1ff}]}, @typed={0x8, 0x68, @pid=r2}]}, 0x13bc}, {&(0x7f0000000240)={0x1f0, 0x27, 0x8, 0x70bd2a, 0x25dfdbfd, "", [@typed={0xc, 0x6f, @u64=0x3}, @nested={0xcc, 0x61, [@typed={0x14, 0x65, @ipv6=@local}, @generic="e0e544e2c7a4180428bbc6", @generic="e18441bfc028b503a3ba77ea939bfe13792160e07267a2ec865ea6b4e6a47c5fd1d3ef37f7854a13e4d1d5f01ec1202749345b3a5ac5abb9075f6c0882e03d1c315f894f8f3e14da95f8b139e24feb78c92ba0fdbaf6691f6cd7ed5a78b4cd2b290615f5ea3a8b6da15b8ab0cb8698c5e616a7525a0ba40b97f3155157112ff34d43ebdba565ef47ab0d1c8fa345929949c1230691eb8329c772e141d55b91628918f08058355976"]}, @typed={0x8, 0xe, @ipv4=@empty}, @typed={0xc, 0xd, @u64=0xffffffffffff4261}, @typed={0xf4, 0x2e, @binary="63b56f9540f2bae14f4a483733cd16e800500cb6f006f8a59c96cef7118b1a5dedee6e8f05c106cb9e2558b1507472b6541f541030898ccae5b53e4ab950430ccda38ad97241b218bfed90df9189c48029cdffc62d36dac252879d9b0dafc35a3d2385ade8fa2e23ee4e5871ebb9b710aa8153e3888b5f35b0bf2a6dae6d0598c22ccf6d44dfd312bedf11679cbc0ff6a9b889abe9f470c4741a9fbac46fc827d21a9052ae22f24264bd9a4418da458fe0e59cfc5e29cc8658dd7dab1291b0c35fcc9cf85faef812b1731ac612372087b349eb1a62605f4c9fcbe5eb994eb6e28c60df60aa83addd13bacfdfad1c3509"}]}, 0x1f0}, {&(0x7f0000001840)={0xd4, 0x1d, 0x300, 0x70bd27, 0x25dfdbfc, "", [@typed={0x14, 0x38, @ipv6=@dev={0xfe, 0x80, [], 0x23}}, @typed={0x4, 0x82}, @nested={0xa4, 0x50, [@typed={0x84, 0x32, @binary="ad8095b8e0ac97efe17e75dc7c498610300dd25998e9a24aca85c24af5bfda761a2e3bf3e7cf3ffe3210006bc5b6b4e283c72367d451d8a95f3847775ec46dcf42fc54d82e956934507a6b0e54af049ffcc7c282ccde8650abf4bd32aa0cc967d76660a1fe6079556ca332ec6441e619778d77a26b1908f807af082ed0"}, @typed={0x4, 0x3a, @binary}, @generic='{', @typed={0x8, 0x34, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}}, @typed={0x8, 0x6f, @u32=0x20}, @typed={0x4, 0x93}]}, @typed={0x8, 0x1, @str=',#\x00'}]}, 0xd4}, {&(0x7f0000001940)={0x150, 0x25, 0x10e, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x3d, @str='\x00'}, @typed={0x14, 0x7a, @str='wlan1,${user/\x00'}, @typed={0x4, 0x15}, @nested={0x120, 0x1b, [@typed={0x8, 0x2b, @fd=r0}, @typed={0xc, 0x8c, @u64=0x4}, @generic="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", @typed={0x8, 0x4d, @pid=r3}]}]}, 0x150}], 0x5, &(0x7f0000001d80)=[@cred={{0x18, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x18, 0x1, 0x2, {r8, r9, r11}}}, @rights={{0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}}], 0x60, 0xc6166b36760cd57c}, 0x40000) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000367, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc001) 18:58:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b", 0x8) 18:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac", 0xc) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc100) 18:58:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc101) 18:58:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000368, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac", 0xc) 18:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:43 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000080)=0xee) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast2}}) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfff) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000140)=""/69) 18:58:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc200) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac", 0xc) 18:58:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000369, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca3", 0xe) 18:58:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc201) 18:58:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca3", 0xe) 18:58:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc300) 18:58:44 executing program 3: r0 = socket$kcm(0x11, 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNGETFILTER(r1, 0x800854db, &(0x7f0000000000)=""/112) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80), 0x0) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca3", 0xe) 18:58:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000036a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 18:58:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc301) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c", 0xf) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c", 0xf) 18:58:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000036b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc400) 18:58:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:44 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "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"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:44 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000080)={0x7, 0x84}) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) 18:58:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc401) 18:58:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c", 0xf) 18:58:44 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "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"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:44 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "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"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc500) 18:58:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000036c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc501) 18:58:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "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"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:45 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "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"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:45 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc600) 18:58:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000036d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:45 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) 18:58:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x31c, &(0x7f0000000000), 0x6a, &(0x7f0000000940)=[{0x0, 0x119, 0x9, "e16e642d423b7436813d879874427c22662647a5485504ecaba3e258bd1fe3f66cacab362e260dc6f18d0ceb7b77fb21e5b227bfdb78539659fc97288ddeb510f874c7d35be2b7680afc24656440580d56ad4ad07fddaa2c1c6e8ba009d48b5314fd433dcd5ea18bbf29fc2d2243a3dbd0a5f4bb8309a489d18e275a0ce34ea70059d51ca72920af3ffe76c7835dfde34ca47e9e89ac7b1964687ccd92afa61752"}, {0x0, 0x10f, 0x3, "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"}, {0x0, 0x114, 0x1, "0db402a3cfcc847c3c54393fdb2571a303db871bb55f74f9eb2328c75b3ba0cd13353f5b0541a2819a57ce0e22b2068e0a87786b05912649c68c6df25884f8294b5e7189e6a642a54c15b3126e1dd519e9f941508919d5d150efb95b39dedb765466a4816663559cf0bb4779a81daefb96cf04"}, {0x0, 0x1, 0x8001, "690ddc6d8fa6f4ac70b14590848a32c4b7a10defc5e4d471df9fe2248af18c0c25d1defc61d568dd3c0f41dcecab49c925385f77a5c9e31020c5ea1ce57b00652a53567ed7bff2e45f200dee88543a60122806a73e300e7596fd6f3ac2dfdce4696f9c086b7c76b6c96c8961e29acff4227548a3853fb0ee61a554cc58accccd1eaec1388a78f0ee94331a57f773a1d1a237185509078f7b7067d4f9731d3647d21dd9320194e2a6ed81e5679b23e840eec88ceead93f15f3e39aa2735841f1b27ce62666930d3108d4bae2bccc500af3242f9cb3c1bb60215ce4555ea3f65831b1856b758e2db4843d2ff72335d370983d031d86f"}, {0x0, 0x11f, 0x1, "174239313054b801000000000000000000ecd04664d19e48659cf51dd007407ed7402ba185a2c55186eb"}, {0x0, 0x13e, 0xfffffffffffffffd, "541a8ba94ab104ca0564baf8d4bfe08182aff6f84cb30a41c9ba2dc4b8a59b39158d3e8b611db073b0c67841a1c7117a7d59deed4f1372ea3199165b351fc2654dc0745ef501361eba97ea507704cf5d8d9063bba5"}, {0xfffffdc1, 0x27, 0x4, "34d2a8e2928965ae83023766a7d81a975f137949463c632016a46a2fa07be05b2076485d912406ea092ef42faa546d52213469af1c1d6620d687809271ffa6aa3640ef223ff6fc6e0ce83a7f51227f95c564d7261ff3ddd20d4250422ff5283a8e99d8d7970571337589acb98bd5c50bc1482738810b91aaffb6ca73ddcea62488d9b0bee5471df000b203fe610332e9af49769e8cbe92d6743431f06735727ed75e76b83184e9c93e0a7c32227c68e8fd71c987401ab6f8b51d302ca5a716b5ca771804d4b943b036762bde0a482a256bda45e09850e2944721a61723c5510307897eb0cb4c744753"}, {0x0, 0x1ff, 0xa02, "cbb8"}], 0x0, 0xa011}, 0x0) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc601) 18:58:45 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00'}) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc700) 18:58:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local, 0x0}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback, 0x0}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f000000b940)={&(0x7f000000ae80)={0xa90, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb799}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x935b}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xde}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5d6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe11c}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x100, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x25c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1d2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8c7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r28}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x90}, 0xc0) 18:58:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af30, &(0x7f0000000300)) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000036e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001c9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc701) 18:58:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000ae40)={'vcan0\x00'}) 18:58:45 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) 18:58:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000036f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:45 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x80000001) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x10000, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x7) writev(r2, &(0x7f0000000640)=[{&(0x7f0000000100)="532da898d742cf45affa56d4106e3b62e1e88c41026daa9592e01d930c3cbef4a67c429cdcbcc6eb6a3b3ad100b7af8bda84fc984d899885ff5c924c23556b4d1a0ede4d9d2d193bb954714090e31b6fd0cec5803642b1a747656d5832c80ac2f388a9d633563f37c932aed795ad27c4e1a43d0b84cbe004312b1628f98e54fa22d6d3b445d09609de7c32e3f1a7ca0f962f0e9842beac075208dbf42427cca6a790d523e175b1623486170e1cc618fb", 0xb0}, {&(0x7f0000000240)="99bab3eeeed789e4284b0a3ef7f24b6794ba9d2dc1ac0e2272d0fce9bb49f806c347301722b51abdf49642b9184168185afeb6ef84bca90d6ceb00d59839f84b7c20a6aac3679d0d474f2875a6e46bde8b6ffb43ae497ec3480dd9703a49c991cb034d96d8074ceb57ba136e302f90c6d0eb4d6e067684e5454f1629327608b0ca", 0x81}, {&(0x7f0000000300)="29c6a61d9b7d5a2ce22588af0053d554eab262eb800c2652b462b7f68a93a1e942665eaaa4162593b211116f8206a0dbc83cb1e59618a70058c2c540cd56a36ef2b1012d945b015475401e4ae2de97c7b2a56cf9911ec49ba20cfecfb5ae5faa7b31d89d368163bffb0446576e0188edeecb7d118964be086d16402f69729a1c201e2d7fa6292893136c83f97ccbad1aa10206e3064accd55cf4e47fc5296e288bb5669362f8b4822ff427d41e21229e6352b6b987078c91", 0xb8}, {&(0x7f00000003c0)="d0d2380cc606b27258aac016dac234f0b40c793d0fbb19ac1838726a61b9ac485a5c10fabb0e8d1bac8e31d7ae3e169323ce8647881455803fc3955d6a5556f4202ea949fd6d1da32505b7368fd09b6f3b66e13cf746b7", 0x57}, {&(0x7f0000000480)="86e2550fa2fcf9c44848b51ff7d318653abbd7a6e10b50cecc62e6993cbc32ba135188749a9e5372f0b0356ea85a44f1d2d79ca6d405611d8a1c8fd92decd22d4b0b8c2ffa3cb6986b771dc70e37b81de78a11b6b0eb4b6de2c89b63cfa3182e199cd38fcac9c68db0b32f345339d543516f80fcf5bf1663c0b2d1e653cc05145350ed75b8a98f7e48acb24ccc182fdd949ec7f832c899c495c0780707e7498509c3c4185f03bf16ddce29f06b2eaadeafd43239d3707bb247ea6efa8cc9817470d812273db68a6ec0682be644fed56342b061540514dd15fa3ebb681db08e7c8b1a93f8361d576afe9e693d2e1275", 0xef}, {&(0x7f0000000580)="76abbd6f4f1fe499ceba162a1011058dcec9c8e7eb5c0c8cff5ee3c51a7418fb883a7b818769bf8bf6ff9ebb1b263faaf6216f73d6531b633beee52714edce8181b705616e3ebf5eb7acf28ea09408", 0x4f}, {&(0x7f0000000600)="ae84d04ab4424655804b87508878eeb2b7aa", 0x12}], 0x7) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc800) 18:58:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc801) 18:58:45 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00'}) 18:58:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000ac40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac80)=0x14, 0x800) 18:58:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000370, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc900) 18:58:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:46 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ac00)={'bridge0\x00'}) 18:58:46 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc901) 18:58:46 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xff, 0x80}) 18:58:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000371, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xca00) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xca01) 18:58:46 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x22c43, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000140)=0x9) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0xa85}, &(0x7f0000000100)=0x8) r2 = socket$kcm(0x11, 0x3, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000180)=0x81, &(0x7f0000000240)=0x2) sendmsg(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:46 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f000000ab80)=0xe8) 18:58:46 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) 18:58:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000372, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:46 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) 18:58:46 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcb00) 18:58:46 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x40000, 0x0) setsockopt$inet_buf(r1, 0x0, 0x2c, &(0x7f00000000c0)="038e41872baaa0802c6fd5d028df5003", 0x10) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0xd, "b492415d9ba377906f25eba94b"}, &(0x7f0000000140)=0x31) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000100)) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)={0x1578, 0x1c8}) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcb01) 18:58:46 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) 18:58:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcc00) 18:58:46 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) 18:58:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000373, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:47 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcc01) 18:58:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:47 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r0 = socket$kcm(0x11, 0x5, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000003, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) 18:58:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcd00) 18:58:47 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcd01) 18:58:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) 18:58:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000375, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:47 executing program 3: socketpair(0x0, 0x8000f, 0x1000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)={@empty, @local, 0x0}, &(0x7f0000000080)=0xc) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x0, [], [{0x100000001, 0x81, 0xfff, 0x7, 0x7, 0x3f}, {0x80000, 0x411, 0x5, 0x1ff, 0x8, 0x9}], [[], []]}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x2, 0x10001, 0x3, 0x1, 0x3}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0xd53, 0x6, @dev={[], 0xe}}, 0x14) r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:47 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xce00) 18:58:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000376, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xce01) 18:58:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) 18:58:47 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcf00) 18:58:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000377, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) 18:58:47 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@empty, 0x4e24, 0x1f, 0x4e24, 0x0, 0xa, 0x80, 0x80, 0x6c, r2, r3}, {0x5, 0x4, 0x6, 0x7ff, 0x0, 0x0, 0x6, 0x7f}, {0x6, 0x1, 0x200, 0x100000000}, 0x1f, 0x6e6bb6, 0x1, 0x1, 0x2, 0x3}, {{@in=@broadcast, 0x4d6, 0x7c}, 0xa, @in=@rand_addr=0xfffffffffffffffe, 0x3506, 0x1, 0x0, 0xd60, 0x7, 0x80000000, 0x70b}}, 0xe8) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530205d0a2d3bb4db3e4cda0abb286708600747be89cc6a751c910ccbf3b3e4ce152e58053f15acea033fd92da72b97a1a442c738b742ad37a5130d79637490617e59b7f2a802059f24000f74a0f63253e2a998c2ae8706d21813ee8d65f9d84383235a43ac8cfd63cfb4517f844359b1ef8b49b3fb2a2c530c00000000000000"], 0x89) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000005c0)=0x6, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r0, 0x10, &(0x7f0000000400)={&(0x7f0000000480)=""/218, 0xda, 0xffffffffffffffff}}, 0x10) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xcf01) 18:58:47 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) 18:58:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) 18:58:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd000) 18:58:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000378, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd001) 18:58:48 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) 18:58:48 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) 18:58:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd100) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd101) 18:58:48 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) 18:58:48 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) 18:58:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) 18:58:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000379, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) 18:58:48 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a080)={0x0, @multicast1, @loopback}, &(0x7f000000a0c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @rand_addr, @multicast1}, &(0x7f000000a1c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000a200)={@loopback}, &(0x7f000000a240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a380)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a3c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000a400)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a480)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a4c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000a540)={'team0\x00'}) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd200) 18:58:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000037a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:48 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd201) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd300) 18:58:48 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) 18:58:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009e00)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000009f00)=0xe8) 18:58:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd301) 18:58:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000037b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd400) 18:58:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009840)={{{@in=@empty, @in6=@local}}, {{@in=@remote}}}, &(0x7f0000009940)=0xe8) 18:58:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:49 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd401) 18:58:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000037c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:49 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:49 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x8ba, 0x5, [0x5, 0x7ff, 0x8b8a, 0x0, 0x8]}, 0x12) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd500) 18:58:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:49 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14, 0x80800) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd501) 18:58:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000037d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:49 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x8ba, 0x5, [0x5, 0x7ff, 0x8b8a, 0x0, 0x8]}, 0x12) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd600) 18:58:49 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x8ba, 0x5, [0x5, 0x7ff, 0x8b8a, 0x0, 0x8]}, 0x12) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:58:49 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd601) 18:58:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b00)={'team0\x00'}) 18:58:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000037e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:49 executing program 3: socket$kcm(0x11, 0x7, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x8ba, 0x5, [0x5, 0x7ff, 0x8b8a, 0x0, 0x8]}, 0x12) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) 18:58:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00'}) 18:58:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd700) 18:58:49 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd701) 18:58:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000037f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:50 executing program 3: socket$kcm(0x11, 0x7, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) 18:58:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000900)={@multicast2, @local}, &(0x7f0000001e80)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:50 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd800) 18:58:50 executing program 3: socket$kcm(0x11, 0x7, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) 18:58:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd801) 18:58:50 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000880)={@loopback}, &(0x7f00000008c0)=0x14) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:50 executing program 3: socket$kcm(0x11, 0x7, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd900) 18:58:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:50 executing program 3: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/116) 18:58:50 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd901) 18:58:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:50 executing program 3: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xda00) 18:58:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000382, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:50 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@multicast1, @loopback}, &(0x7f0000000700)=0xc) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xda01) 18:58:50 executing program 3: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 18:58:51 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:51 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 3: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 18:58:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdb00) 18:58:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:51 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:51 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="95000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x4}, &(0x7f00000000c0)=0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, 0xfffffffffffffffe, 0x800, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100), 0x4) 18:58:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdb01) 18:58:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdc00) 18:58:51 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="95000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x4}, &(0x7f00000000c0)=0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, 0xfffffffffffffffe, 0x800, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100), 0x4) 18:58:51 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000384, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:51 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101000, 0x0) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdc01) 18:58:51 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="95000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x4}, &(0x7f00000000c0)=0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, 0xfffffffffffffffe, 0x800, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100), 0x4) 18:58:51 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000385, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdd00) 18:58:51 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="95000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x4}, &(0x7f00000000c0)=0x8) openat$proc_capi20ncci(0xffffffffffffff9c, 0xfffffffffffffffe, 0x800, 0x0) 18:58:51 executing program 0: getsockname$packet(0xffffffffffffffff, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:51 executing program 2: r0 = socket$kcm(0x11, 0x0, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdd01) 18:58:52 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="95000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x28) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x4}, &(0x7f00000000c0)=0x8) 18:58:52 executing program 0: getsockname$packet(0xffffffffffffffff, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:52 executing program 2: r0 = socket$kcm(0x11, 0x0, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000387, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:52 executing program 0: getsockname$packet(0xffffffffffffffff, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:52 executing program 2: r0 = socket$kcm(0x11, 0x0, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xde00) 18:58:52 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xde01) 18:58:52 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:52 executing program 2: socket$kcm(0x11, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:52 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdf00) 18:58:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:52 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xdf01) 18:58:52 executing program 2: socket$kcm(0x11, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:52 executing program 3: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:52 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000389, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:52 executing program 3: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe000) 18:58:52 executing program 2: socket$kcm(0x11, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}, {{&(0x7f0000009480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000009700)=[{&(0x7f0000009500)=""/217, 0xd9}, {&(0x7f0000009600)=""/217, 0xd9}], 0x2}, 0x9}], 0x4, 0x12022, &(0x7f00000097c0)) 18:58:52 executing program 0: socket$kcm(0x11, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:52 executing program 3: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000038a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:53 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe001) 18:58:53 executing program 0: socket$kcm(0x11, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:53 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x12022, &(0x7f00000097c0)) 18:58:53 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe100) 18:58:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001da, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:53 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x12022, &(0x7f00000097c0)) 18:58:53 executing program 0: socket$kcm(0x11, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000050c0)=0x14) 18:58:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000038b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:53 executing program 3: r0 = socket$kcm(0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe101) 18:58:53 executing program 3: socket$kcm(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe200) 18:58:53 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x12022, &(0x7f00000097c0)) 18:58:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000050c0)) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe201) 18:58:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000038c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:53 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f0000009340)=[{&(0x7f0000009140)=""/37, 0x25}, {&(0x7f0000009180)=""/211, 0xd3}, {&(0x7f0000009280)=""/182, 0xb6}], 0x3, &(0x7f0000009380)=""/226, 0xe2}}], 0x3, 0x12022, &(0x7f00000097c0)) 18:58:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) getsockname$packet(r0, 0x0, 0x0) 18:58:53 executing program 3: socket$kcm(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe300) 18:58:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000038d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe301) 18:58:53 executing program 3: socket$kcm(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) 18:58:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe400) 18:58:53 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}, {{&(0x7f0000007e40)=@rc, 0x80, &(0x7f0000009080)=[{&(0x7f0000007ec0)=""/40, 0x28}, {&(0x7f0000007f00)=""/82, 0x52}, {&(0x7f0000007f80)}, {&(0x7f0000007fc0)=""/90, 0x5a}, {&(0x7f0000008040)=""/62, 0x3e}, {&(0x7f0000008080)=""/4096, 0x1000}], 0x6}, 0x979}], 0x2, 0x12022, &(0x7f00000097c0)) 18:58:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) getsockname$packet(r0, 0x0, 0x0) 18:58:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000038e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe401) 18:58:54 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, &(0x7f00000000c0)) 18:58:54 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{&(0x7f0000007bc0)=@ipx, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}], 0x1, 0x12022, &(0x7f00000097c0)) 18:58:54 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) getsockname$packet(r0, 0x0, 0x0) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe500) 18:58:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000038f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000388, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:54 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740), 0x0, 0x12022, &(0x7f00000097c0)) 18:58:54 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe501) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe600) 18:58:54 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740), 0x0, 0x12022, &(0x7f00000097c0)) 18:58:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe601) 18:58:54 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000390, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:54 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe700) 18:58:54 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740), 0x0, 0x12022, &(0x7f00000097c0)) 18:58:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe701) 18:58:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000391, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:54 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, &(0x7f0000007dc0)=[{&(0x7f0000007c40)=""/192, 0xc0}, {&(0x7f0000007d00)=""/164, 0xa4}], 0x2, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}], 0x1, 0x12022, &(0x7f00000097c0)) 18:58:54 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:54 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe800) 18:58:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000392, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:55 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000007e00)=""/61, 0x3d}, 0x3}], 0x1, 0x12022, &(0x7f00000097c0)) 18:58:55 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe801) 18:58:55 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x12022, &(0x7f00000097c0)) 18:58:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000393, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:55 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe900) 18:58:55 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:55 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12022, &(0x7f00000097c0)) 18:58:55 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe901) 18:58:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000394, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:55 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000097c0)) 18:58:55 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xea00) 18:58:55 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xea01) 18:58:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000395, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:56 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xeb00) 18:58:56 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xeb01) 18:58:56 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000097c0)) 18:58:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000396, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xec00) 18:58:56 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xec01) 18:58:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xed00) 18:58:56 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000397, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:57 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xed01) 18:58:57 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000097c0)) 18:58:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:57 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xee00) 18:58:57 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000398, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:57 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xee01) 18:58:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:57 executing program 0: r0 = memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:57 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:57 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xef00) 18:58:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000399, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:58 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f0000009740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12022, 0x0) 18:58:58 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xef01) 18:58:58 executing program 0: r0 = memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:58 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000039a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:58 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf000) 18:58:58 executing program 0: r0 = memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000039b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:58 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) close(r1) 18:58:58 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:58 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf001) 18:58:58 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf100) 18:58:58 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:58 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) close(r1) 18:58:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:58 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000039c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:58 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf101) 18:58:58 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) close(r1) 18:58:59 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf200) 18:58:59 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) 18:58:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000039d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:59 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) 18:58:59 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf201) 18:58:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf300) 18:58:59 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) 18:58:59 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000039e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:59 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:59 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r0) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf301) 18:58:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:58:59 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) 18:58:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000039f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:59 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf400) 18:58:59 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:58:59 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf401) 18:58:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:58:59 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf500) 18:58:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:00 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) 18:59:00 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf501) 18:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r0) 18:59:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf600) 18:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) close(r0) 18:59:00 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf601) 18:59:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) close(r0) 18:59:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:00 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf700) 18:59:00 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf701) 18:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) close(r0) 18:59:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:00 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(0xffffffffffffffff) close(r0) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf800) 18:59:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:00 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:00 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf801) 18:59:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(0xffffffffffffffff) close(r0) 18:59:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:01 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf900) 18:59:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(0xffffffffffffffff) close(r0) 18:59:01 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:01 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf901) 18:59:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) 18:59:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) 18:59:01 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfa00) 18:59:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:01 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) 18:59:01 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfa01) 18:59:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:01 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:01 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfb00) 18:59:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:02 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfb01) 18:59:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:02 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfc00) 18:59:02 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfc01) 18:59:02 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfd00) 18:59:02 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfd01) 18:59:02 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:02 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfe00) 18:59:02 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfe01) 18:59:02 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:02 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfeff) 18:59:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:03 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xff00) 18:59:03 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xff01) 18:59:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:03 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xfffe) 18:59:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:03 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x20000) 18:59:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:03 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x40000) 18:59:03 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:03 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x200000) 18:59:04 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1000000) 18:59:04 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:04 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:04 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1010000) 18:59:04 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2000000) 18:59:04 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:04 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2010000) 18:59:04 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3000000) 18:59:04 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:04 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3010000) 18:59:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:04 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:04 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4000000) 18:59:05 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:05 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4010000) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5000000) 18:59:05 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5010000) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6000000) 18:59:05 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:05 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6010000) 18:59:05 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:05 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7000000) 18:59:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:06 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7010000) 18:59:06 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8000000) 18:59:06 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:06 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8010000) 18:59:06 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:06 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9000000) 18:59:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:06 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:06 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x9010000) 18:59:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:06 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa000000) 18:59:07 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:07 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xa010000) 18:59:07 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb000000) 18:59:07 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:07 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xb010000) 18:59:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:07 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc000000) 18:59:07 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:07 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xc010000) 18:59:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:08 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd000000) 18:59:08 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:08 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:08 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xd010000) 18:59:08 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:08 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe000000) 18:59:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:08 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:08 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xe010000) 18:59:08 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:08 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf000000) 18:59:09 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0xf010000) 18:59:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:09 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x10000000) 18:59:09 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:09 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x10010000) 18:59:09 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:09 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x11000000) 18:59:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:09 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:09 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x11010000) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x12000000) 18:59:10 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x12010000) 18:59:10 executing program 3: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x13000000) 18:59:10 executing program 3: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x13010000) 18:59:10 executing program 0: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x14000000) 18:59:10 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 3: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x14010000) 18:59:10 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:10 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x15000000) 18:59:10 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x15010000) 18:59:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:11 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x16000000) 18:59:11 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:11 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x16010000) 18:59:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:11 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x17000000) 18:59:11 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x17010000) 18:59:11 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003c9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000001fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:11 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x18000000) 18:59:11 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:11 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x18010000) 18:59:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:12 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x19000000) 18:59:12 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:12 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x19010000) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1a000000) 18:59:12 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1a010000) 18:59:12 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:12 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1b000000) 18:59:12 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1b010000) 18:59:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:12 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:12 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1c000000) 18:59:13 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:13 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1c010000) 18:59:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:13 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1d000000) 18:59:13 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1d010000) 18:59:13 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:13 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1e000000) 18:59:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:13 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1e010000) 18:59:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:14 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1f000000) 18:59:14 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:14 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x1f010000) 18:59:14 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x20000000) 18:59:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:14 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:14 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x20010000) 18:59:14 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x20020000) 18:59:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:14 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:14 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x21000000) 18:59:14 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 0: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x21010000) 18:59:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:15 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x22000000) 18:59:15 executing program 0: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000209, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:15 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x22010000) 18:59:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:15 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x23000000) 18:59:15 executing program 0: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000020a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:15 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x23010000) 18:59:15 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x24000000) 18:59:15 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:16 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x24010000) 18:59:16 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:16 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x25000000) 18:59:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000020b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:16 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x25010000) 18:59:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003da, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:16 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x26000000) 18:59:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000020c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:16 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x26010000) 18:59:16 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:16 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x27000000) 18:59:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x27010000) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x28000000) 18:59:17 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000020d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x28010000) 18:59:17 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:17 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x29000000) 18:59:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000020e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:17 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x29010000) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2a000000) 18:59:17 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:17 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000020f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:17 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2a010000) 18:59:18 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2b000000) 18:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:18 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2b010000) 18:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:18 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2c000000) 18:59:18 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:18 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2c010000) 18:59:18 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2d000000) 18:59:18 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:18 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:18 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2d010000) 18:59:18 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:19 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2e000000) 18:59:19 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2e010000) 18:59:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000212, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:19 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2f000000) 18:59:19 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:19 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x2f010000) 18:59:19 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000213, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:19 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:19 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x30000000) 18:59:19 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x30010000) 18:59:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:20 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x31000000) 18:59:20 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x31010000) 18:59:20 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000214, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:20 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:20 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:20 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x32000000) 18:59:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x32010000) 18:59:20 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:20 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000215, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x33000000) 18:59:20 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:20 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x33010000) 18:59:20 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:20 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:20 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x34000000) 18:59:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:21 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000216, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:21 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x34010000) 18:59:21 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:21 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:21 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x35000000) 18:59:21 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x35010000) 18:59:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:21 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000217, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:21 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x36000000) 18:59:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:21 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x36010000) 18:59:21 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:21 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x37000000) 18:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:22 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x37010000) 18:59:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:22 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x38000000) 18:59:22 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x38010000) 18:59:22 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:22 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x39000000) 18:59:22 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:22 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000219, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:22 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x39010000) 18:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:22 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3a000000) 18:59:22 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3a010000) 18:59:23 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000021a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3b000000) 18:59:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3b010000) 18:59:23 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3c000000) 18:59:23 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:23 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3c010000) 18:59:23 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000021b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3d000000) 18:59:23 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:23 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:23 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:23 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3d010000) 18:59:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:24 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3e000000) 18:59:24 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:24 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3e010000) 18:59:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:24 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3f000000) 18:59:24 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000021c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:24 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:24 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:24 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x3f010000) 18:59:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:24 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:24 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x40000000) 18:59:24 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:24 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x40010000) 18:59:25 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000021d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x41000000) 18:59:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:25 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x41010000) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x42000000) 18:59:25 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x42010000) 18:59:25 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x43000000) 18:59:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000021e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:25 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x43010000) 18:59:25 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x44000000) 18:59:25 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x44010000) 18:59:26 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000021f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x45000000) 18:59:26 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000000000003fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:26 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x45010000) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x46000000) 18:59:26 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x46010000) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x47000000) 18:59:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:26 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:26 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x47010000) 18:59:26 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:27 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000221, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:27 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x48000000) 18:59:27 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:27 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x48010000) 18:59:27 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:27 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x49000000) 18:59:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000222, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:27 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000407, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:27 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x49010000) 18:59:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:27 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:27 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4a000000) 18:59:27 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:27 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4a010000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000040a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000224, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:28 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000040b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4b000000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000040c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4b010000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000040d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000040e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000225, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4c000000) 18:59:28 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4c010000) 18:59:28 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000040f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:28 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:28 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4d000000) 18:59:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000226, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4d010000) 18:59:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000411, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4e000000) 18:59:29 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 2: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4e010000) 18:59:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000412, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:29 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000227, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:29 executing program 2: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4f000000) 18:59:29 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000413, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:29 executing program 2: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:29 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x4f010000) 18:59:29 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x50000000) 18:59:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000228, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:30 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:30 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x50010000) 18:59:30 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000415, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x51000000) 18:59:30 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, 0x0, 0x0, 0x0, 0x1000) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x51010000) 18:59:30 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x52000000) 18:59:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000229, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:30 executing program 0: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:30 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x52010000) 18:59:30 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000417, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:30 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:30 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x53000000) 18:59:30 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x53010000) 18:59:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:31 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000022a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x54000000) 18:59:31 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:31 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x54010000) 18:59:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000419, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000022b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x55000000) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x55010000) 18:59:31 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000041a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x56000000) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x56010000) 18:59:31 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000041b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x57000000) 18:59:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000022c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x57010000) 18:59:31 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:31 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x58000000) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x58010000) 18:59:32 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000041c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x59000000) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x59010000) 18:59:32 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000041d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000022d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5a000000) 18:59:32 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000041e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5a010000) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5b000000) 18:59:32 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000041f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:32 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5b010000) 18:59:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000022e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:32 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5c000000) 18:59:33 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5c010000) 18:59:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000421, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5d000000) 18:59:33 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:33 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000022f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5d010000) 18:59:33 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5e000000) 18:59:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5e010000) 18:59:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000423, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:33 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5f000000) 18:59:34 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:59:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:34 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:59:34 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:59:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x5f010000) 18:59:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000424, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:34 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:59:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x60000000) 18:59:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000231, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000425, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x60010000) 18:59:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x61000000) 18:59:34 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x61010000) 18:59:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000426, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:35 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:59:35 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x62000000) 18:59:35 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000427, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000232, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x62010000) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x63000000) 18:59:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000428, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x63010000) 18:59:35 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0xb4, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:59:35 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x64000000) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x64010000) 18:59:35 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x65000000) 18:59:36 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0xfffffffffffffef3) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:36 executing program 0 (fault-call:5 fault-nth:0): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000429, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:36 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0), 0x0, 0xa011}, 0x0) 18:59:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000233, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x65010000) 18:59:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x66000000) 18:59:36 executing program 2 (fault-call:5 fault-nth:0): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000042a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3309.072214][T10478] FAULT_INJECTION: forcing a failure. [ 3309.072214][T10478] name failslab, interval 1, probability 0, space 0, times 0 [ 3309.102099][T10478] CPU: 0 PID: 10478 Comm: syz-executor.0 Not tainted 5.1.0+ #9 [ 3309.109689][T10478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3309.119761][T10478] Call Trace: [ 3309.123084][T10478] dump_stack+0x172/0x1f0 [ 3309.127439][T10478] should_fail.cold+0xa/0x15 [ 3309.132056][T10478] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3309.137882][T10478] ? ___might_sleep+0x163/0x280 [ 3309.142752][T10478] __should_failslab+0x121/0x190 [ 3309.147711][T10478] should_failslab+0x9/0x14 [ 3309.152245][T10478] kmem_cache_alloc+0x2b2/0x6f0 [ 3309.157113][T10478] ? retint_kernel+0x2b/0x2b [ 3309.161729][T10478] getname_flags+0xd6/0x5b0 [ 3309.166249][T10478] ? do_fast_syscall_32+0xd1/0xd54 [ 3309.171375][T10478] __ia32_compat_sys_execveat+0xd4/0x140 [ 3309.177034][T10478] do_fast_syscall_32+0x281/0xd54 [ 3309.182085][T10478] entry_SYSENTER_compat+0x70/0x7f [ 3309.187212][T10478] RIP: 0023:0xf7f19849 [ 3309.191297][T10478] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3309.210917][T10478] RSP: 002b:00000000f5d150cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 18:59:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x66010000) 18:59:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x67000000) [ 3309.219352][T10478] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3309.227347][T10478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3309.235331][T10478] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3309.243322][T10478] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3309.251316][T10478] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:36 executing program 0 (fault-call:5 fault-nth:1): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:36 executing program 3 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:36 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x67010000) 18:59:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000234, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:36 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3309.507155][T10722] FAULT_INJECTION: forcing a failure. [ 3309.507155][T10722] name failslab, interval 1, probability 0, space 0, times 0 [ 3309.536267][T10722] CPU: 0 PID: 10722 Comm: syz-executor.0 Not tainted 5.1.0+ #9 [ 3309.543853][T10722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3309.553923][T10722] Call Trace: [ 3309.557235][T10722] dump_stack+0x172/0x1f0 [ 3309.561590][T10722] should_fail.cold+0xa/0x15 [ 3309.566204][T10722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3309.572037][T10722] ? ___might_sleep+0x163/0x280 [ 3309.573683][T10750] FAULT_INJECTION: forcing a failure. [ 3309.573683][T10750] name failslab, interval 1, probability 0, space 0, times 0 [ 3309.578373][T10722] __should_failslab+0x121/0x190 [ 3309.578392][T10722] should_failslab+0x9/0x14 [ 3309.578409][T10722] kmem_cache_alloc+0x2b2/0x6f0 [ 3309.578429][T10722] ? save_stack+0x5c/0x90 [ 3309.578451][T10722] dup_fd+0x85/0xb30 [ 3309.578470][T10722] ? entry_SYSENTER_compat+0x70/0x7f [ 3309.578490][T10722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3309.578507][T10722] ? debug_smp_processor_id+0x3c/0x280 [ 3309.578533][T10722] unshare_fd+0x160/0x1d0 [ 3309.578552][T10722] ? pidfd_release+0x50/0x50 [ 3309.578572][T10722] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3309.578590][T10722] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3309.578607][T10722] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3309.578637][T10722] unshare_files+0x7f/0x1f0 [ 3309.660315][T10722] ? __ia32_sys_unshare+0x40/0x40 [ 3309.665369][T10722] __do_execve_file.isra.0+0x27e/0x23a0 [ 3309.670948][T10722] ? copy_strings_kernel+0x110/0x110 [ 3309.676255][T10722] ? strncpy_from_user+0x2ac/0x380 [ 3309.681390][T10722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3309.687771][T10722] __ia32_compat_sys_execveat+0xf3/0x140 [ 3309.693433][T10722] do_fast_syscall_32+0x281/0xd54 [ 3309.698488][T10722] entry_SYSENTER_compat+0x70/0x7f [ 3309.703608][T10722] RIP: 0023:0xf7f19849 [ 3309.707693][T10722] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3309.727314][T10722] RSP: 002b:00000000f5d150cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3309.735745][T10722] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3309.743733][T10722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 18:59:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x68000000) [ 3309.751808][T10722] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3309.759793][T10722] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3309.767862][T10722] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3309.776558][T10750] CPU: 1 PID: 10750 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3309.784124][T10750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3309.794190][T10750] Call Trace: [ 3309.797502][T10750] dump_stack+0x172/0x1f0 [ 3309.801867][T10750] should_fail.cold+0xa/0x15 18:59:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x68010000) [ 3309.806486][T10750] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3309.812304][T10750] ? retint_kernel+0x2b/0x2b [ 3309.816914][T10750] __should_failslab+0x121/0x190 [ 3309.821873][T10750] should_failslab+0x9/0x14 [ 3309.826399][T10750] kmem_cache_alloc+0x2b2/0x6f0 [ 3309.831276][T10750] ? retint_kernel+0x2b/0x2b [ 3309.835883][T10750] getname_flags+0xd6/0x5b0 [ 3309.840407][T10750] __ia32_compat_sys_execveat+0xd4/0x140 [ 3309.846163][T10750] do_fast_syscall_32+0x281/0xd54 [ 3309.851219][T10750] entry_SYSENTER_compat+0x70/0x7f 18:59:37 executing program 0 (fault-call:5 fault-nth:2): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x69000000) [ 3309.856343][T10750] RIP: 0023:0xf7f8a849 [ 3309.860419][T10750] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3309.880034][T10750] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3309.888463][T10750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3309.896465][T10750] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 18:59:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000042b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3309.904464][T10750] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3309.912455][T10750] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3309.920452][T10750] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:37 executing program 3 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:37 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x69010000) [ 3310.007166][T10887] FAULT_INJECTION: forcing a failure. [ 3310.007166][T10887] name failslab, interval 1, probability 0, space 0, times 0 [ 3310.046866][T10887] CPU: 0 PID: 10887 Comm: syz-executor.0 Not tainted 5.1.0+ #9 [ 3310.054460][T10887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3310.064529][T10887] Call Trace: [ 3310.067861][T10887] dump_stack+0x172/0x1f0 [ 3310.072221][T10887] should_fail.cold+0xa/0x15 [ 3310.076835][T10887] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3310.082674][T10887] ? ___might_sleep+0xd2/0x280 [ 3310.087465][T10887] __should_failslab+0x121/0x190 [ 3310.092421][T10887] should_failslab+0x9/0x14 [ 3310.096949][T10887] kmem_cache_alloc_trace+0x2d1/0x760 [ 3310.097745][T10939] FAULT_INJECTION: forcing a failure. [ 3310.097745][T10939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3310.102352][T10887] ? lock_downgrade+0x880/0x880 [ 3310.120409][T10887] alloc_fdtable+0x86/0x290 [ 3310.124928][T10887] dup_fd+0x743/0xb30 [ 3310.128936][T10887] unshare_fd+0x160/0x1d0 [ 3310.133286][T10887] ? pidfd_release+0x50/0x50 [ 3310.137891][T10887] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 3310.143544][T10887] unshare_files+0x7f/0x1f0 [ 3310.148054][T10887] ? should_fail+0x1de/0x852 [ 3310.152676][T10887] ? __ia32_sys_unshare+0x40/0x40 [ 3310.157719][T10887] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3310.163552][T10887] __do_execve_file.isra.0+0x27e/0x23a0 [ 3310.169101][T10887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3310.175358][T10887] ? __phys_addr_symbol+0x30/0x70 [ 3310.180389][T10887] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3310.186114][T10887] ? __check_object_size+0x3d/0x42f [ 3310.191325][T10887] ? copy_strings_kernel+0x110/0x110 [ 3310.196620][T10887] ? strncpy_from_user+0x2ac/0x380 [ 3310.201750][T10887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3310.208007][T10887] __ia32_compat_sys_execveat+0xf3/0x140 [ 3310.213654][T10887] do_fast_syscall_32+0x281/0xd54 [ 3310.218866][T10887] entry_SYSENTER_compat+0x70/0x7f [ 3310.223983][T10887] RIP: 0023:0xf7f19849 [ 3310.228054][T10887] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3310.247665][T10887] RSP: 002b:00000000f5d150cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3310.256785][T10887] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3310.264773][T10887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3310.272752][T10887] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3310.280724][T10887] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3310.288698][T10887] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3310.296719][T10939] CPU: 1 PID: 10939 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3310.304283][T10939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3310.314436][T10939] Call Trace: [ 3310.317759][T10939] dump_stack+0x172/0x1f0 [ 3310.322118][T10939] should_fail.cold+0xa/0x15 [ 3310.326742][T10939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3310.332563][T10939] ? debug_smp_processor_id+0x3c/0x280 [ 3310.338212][T10939] ? perf_trace_lock+0xeb/0x4c0 [ 3310.343094][T10939] should_fail_alloc_page+0x50/0x60 [ 3310.348310][T10939] __alloc_pages_nodemask+0x1a1/0x8d0 18:59:37 executing program 0 (fault-call:5 fault-nth:3): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3310.353714][T10939] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3310.359445][T10939] ? find_held_lock+0x35/0x130 [ 3310.364243][T10939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3310.370080][T10939] cache_grow_begin+0x9c/0x860 [ 3310.374874][T10939] ? getname_flags+0xd6/0x5b0 [ 3310.379604][T10939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3310.385889][T10939] kmem_cache_alloc+0x62d/0x6f0 [ 3310.390760][T10939] ? fput+0x1b/0x20 [ 3310.394603][T10939] getname_flags+0xd6/0x5b0 [ 3310.399132][T10939] ? do_fast_syscall_32+0xd1/0xd54 [ 3310.404280][T10939] __ia32_compat_sys_execveat+0xd4/0x140 [ 3310.405862][T10972] FAULT_INJECTION: forcing a failure. [ 3310.405862][T10972] name failslab, interval 1, probability 0, space 0, times 0 [ 3310.409943][T10939] do_fast_syscall_32+0x281/0xd54 [ 3310.409971][T10939] entry_SYSENTER_compat+0x70/0x7f [ 3310.409984][T10939] RIP: 0023:0xf7f8a849 [ 3310.410001][T10939] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3310.410011][T10939] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3310.410027][T10939] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3310.410036][T10939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3310.410045][T10939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3310.410054][T10939] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3310.410075][T10939] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3310.506637][T10972] CPU: 0 PID: 10972 Comm: syz-executor.0 Not tainted 5.1.0+ #9 [ 3310.514205][T10972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3310.524276][T10972] Call Trace: [ 3310.527587][T10972] dump_stack+0x172/0x1f0 [ 3310.531940][T10972] should_fail.cold+0xa/0x15 [ 3310.536563][T10972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3310.542399][T10972] ? ___might_sleep+0x163/0x280 [ 3310.547308][T10972] __should_failslab+0x121/0x190 [ 3310.552275][T10972] should_failslab+0x9/0x14 18:59:37 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/8) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x400) [ 3310.556810][T10972] kmem_cache_alloc_trace+0x2d1/0x760 [ 3310.562200][T10972] ? lock_downgrade+0x880/0x880 [ 3310.567079][T10972] alloc_fdtable+0x86/0x290 [ 3310.571607][T10972] dup_fd+0x743/0xb30 [ 3310.575634][T10972] unshare_fd+0x160/0x1d0 [ 3310.580000][T10972] ? pidfd_release+0x50/0x50 [ 3310.584626][T10972] ? unshare_fd+0x26/0x1d0 [ 3310.596896][T10972] unshare_files+0x7f/0x1f0 [ 3310.601511][T10972] ? __ia32_sys_unshare+0x40/0x40 [ 3310.606578][T10972] __do_execve_file.isra.0+0x27e/0x23a0 [ 3310.612149][T10972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3310.618412][T10972] ? __phys_addr_symbol+0x30/0x70 [ 3310.623455][T10972] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3310.629198][T10972] ? __check_object_size+0x3d/0x42f [ 3310.634426][T10972] ? copy_strings_kernel+0x110/0x110 [ 3310.640517][T10972] ? strncpy_from_user+0x2ac/0x380 [ 3310.645655][T10972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3310.652034][T10972] __ia32_compat_sys_execveat+0xf3/0x140 [ 3310.657711][T10972] do_fast_syscall_32+0x281/0xd54 [ 3310.662771][T10972] entry_SYSENTER_compat+0x70/0x7f [ 3310.667900][T10972] RIP: 0023:0xf7f19849 [ 3310.671995][T10972] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3310.692125][T10972] RSP: 002b:00000000f5d150cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3310.700560][T10972] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 18:59:37 executing program 3 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3310.708547][T10972] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3310.716531][T10972] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3310.724532][T10972] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3310.732517][T10972] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000235, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:38 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x1) gettid() ioctl$TUNGETFILTER(r1, 0x800854db, &(0x7f0000000180)=""/70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6a000000) 18:59:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000042c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:38 executing program 0 (fault-call:5 fault-nth:4): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3310.814982][T11081] FAULT_INJECTION: forcing a failure. [ 3310.814982][T11081] name failslab, interval 1, probability 0, space 0, times 0 [ 3310.865497][T11081] CPU: 0 PID: 11081 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3310.873094][T11081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3310.883161][T11081] Call Trace: [ 3310.886473][T11081] dump_stack+0x172/0x1f0 [ 3310.890862][T11081] should_fail.cold+0xa/0x15 [ 3310.895477][T11081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3310.901306][T11081] ? ___might_sleep+0x163/0x280 [ 3310.906180][T11081] __should_failslab+0x121/0x190 [ 3310.911156][T11081] should_failslab+0x9/0x14 [ 3310.915696][T11081] kmem_cache_alloc_trace+0x2d1/0x760 [ 3310.921089][T11081] ? lock_downgrade+0x880/0x880 [ 3310.925972][T11081] alloc_fdtable+0x86/0x290 [ 3310.930503][T11081] dup_fd+0x743/0xb30 [ 3310.934515][T11081] unshare_fd+0x160/0x1d0 [ 3310.938868][T11081] ? pidfd_release+0x50/0x50 [ 3310.943491][T11081] unshare_files+0x7f/0x1f0 [ 3310.948024][T11081] ? __ia32_sys_unshare+0x40/0x40 [ 3310.953080][T11081] ? check_stack_object+0x114/0x160 [ 3310.957538][T11088] FAULT_INJECTION: forcing a failure. [ 3310.957538][T11088] name failslab, interval 1, probability 0, space 0, times 0 [ 3310.958296][T11081] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 3310.958323][T11081] __do_execve_file.isra.0+0x27e/0x23a0 [ 3310.958339][T11081] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3310.958364][T11081] ? __phys_addr_symbol+0x30/0x70 [ 3310.993285][T11081] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3310.999025][T11081] ? __check_object_size+0x3d/0x42f [ 3311.004251][T11081] ? copy_strings_kernel+0x110/0x110 [ 3311.009580][T11081] ? strncpy_from_user+0x2ac/0x380 [ 3311.014741][T11081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3311.021049][T11081] __ia32_compat_sys_execveat+0xf3/0x140 [ 3311.026727][T11081] do_fast_syscall_32+0x281/0xd54 [ 3311.032132][T11081] entry_SYSENTER_compat+0x70/0x7f [ 3311.037255][T11081] RIP: 0023:0xf7f8a849 [ 3311.041331][T11081] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3311.060955][T11081] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3311.069399][T11081] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3311.077385][T11081] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3311.085368][T11081] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3311.093350][T11081] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3311.101335][T11081] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3311.110794][T11088] CPU: 1 PID: 11088 Comm: syz-executor.0 Not tainted 5.1.0+ #9 [ 3311.118374][T11088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3311.128445][T11088] Call Trace: [ 3311.131753][T11088] dump_stack+0x172/0x1f0 [ 3311.136093][T11088] should_fail.cold+0xa/0x15 [ 3311.140692][T11088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3311.146520][T11088] ? ___might_sleep+0x163/0x280 [ 3311.151381][T11088] __should_failslab+0x121/0x190 [ 3311.156324][T11088] should_failslab+0x9/0x14 [ 3311.160847][T11088] kmem_cache_alloc_node_trace+0x270/0x720 [ 3311.166675][T11088] __kmalloc_node+0x3d/0x70 [ 3311.171196][T11088] kvmalloc_node+0x68/0x100 [ 3311.175714][T11088] alloc_fdtable+0xd6/0x290 [ 3311.180223][T11088] dup_fd+0x743/0xb30 [ 3311.184220][T11088] unshare_fd+0x160/0x1d0 [ 3311.188553][T11088] ? pidfd_release+0x50/0x50 [ 3311.193169][T11088] ? find_held_lock+0x35/0x130 [ 3311.197942][T11088] ? cache_grow_end+0xa4/0x190 [ 3311.202740][T11088] unshare_files+0x7f/0x1f0 [ 3311.207256][T11088] ? __ia32_sys_unshare+0x40/0x40 [ 3311.212300][T11088] __do_execve_file.isra.0+0x27e/0x23a0 [ 3311.217852][T11088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3311.224098][T11088] ? __phys_addr_symbol+0x30/0x70 [ 3311.229124][T11088] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3311.234858][T11088] ? __check_object_size+0x3d/0x42f [ 3311.240073][T11088] ? copy_strings_kernel+0x110/0x110 [ 3311.245361][T11088] ? strncpy_from_user+0x2ac/0x380 [ 3311.250488][T11088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3311.256741][T11088] __ia32_compat_sys_execveat+0xf3/0x140 [ 3311.262423][T11088] do_fast_syscall_32+0x281/0xd54 [ 3311.267464][T11088] entry_SYSENTER_compat+0x70/0x7f [ 3311.272586][T11088] RIP: 0023:0xf7f19849 [ 3311.276671][T11088] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3311.296577][T11088] RSP: 002b:00000000f5d150cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3311.305007][T11088] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 18:59:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6a010000) [ 3311.313002][T11088] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3311.320996][T11088] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3311.328986][T11088] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3311.336985][T11088] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:38 executing program 3 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:38 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6b000000) 18:59:38 executing program 0 (fault-call:5 fault-nth:5): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3311.489937][T11170] FAULT_INJECTION: forcing a failure. [ 3311.489937][T11170] name failslab, interval 1, probability 0, space 0, times 0 [ 3311.524579][T11170] CPU: 1 PID: 11170 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3311.532188][T11170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3311.542258][T11170] Call Trace: [ 3311.545575][T11170] dump_stack+0x172/0x1f0 [ 3311.549939][T11170] should_fail.cold+0xa/0x15 [ 3311.554563][T11170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3311.560428][T11170] __should_failslab+0x121/0x190 [ 3311.563495][T11250] FAULT_INJECTION: forcing a failure. [ 3311.563495][T11250] name failslab, interval 1, probability 0, space 0, times 0 [ 3311.565394][T11170] should_failslab+0x9/0x14 [ 3311.565416][T11170] kmem_cache_alloc_node_trace+0x270/0x720 [ 3311.565446][T11170] __kmalloc_node+0x3d/0x70 [ 3311.565465][T11170] kvmalloc_node+0x68/0x100 [ 3311.565495][T11170] alloc_fdtable+0xd6/0x290 [ 3311.565519][T11170] dup_fd+0x743/0xb30 [ 3311.607383][T11170] unshare_fd+0x160/0x1d0 [ 3311.611740][T11170] ? pidfd_release+0x50/0x50 [ 3311.616351][T11170] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 3311.622011][T11170] unshare_files+0x7f/0x1f0 [ 3311.626532][T11170] ? should_fail+0x1de/0x852 [ 3311.631157][T11170] ? __ia32_sys_unshare+0x40/0x40 [ 3311.636204][T11170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3311.642041][T11170] __do_execve_file.isra.0+0x27e/0x23a0 [ 3311.647609][T11170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3311.653872][T11170] ? __phys_addr_symbol+0x30/0x70 [ 3311.658917][T11170] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3311.664656][T11170] ? __check_object_size+0x3d/0x42f [ 3311.669889][T11170] ? copy_strings_kernel+0x110/0x110 [ 3311.675217][T11170] ? strncpy_from_user+0x2ac/0x380 [ 3311.680353][T11170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3311.686616][T11170] __ia32_compat_sys_execveat+0xf3/0x140 [ 3311.692448][T11170] do_fast_syscall_32+0x281/0xd54 [ 3311.697514][T11170] entry_SYSENTER_compat+0x70/0x7f [ 3311.702636][T11170] RIP: 0023:0xf7f8a849 [ 3311.706726][T11170] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3311.726349][T11170] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6b010000) [ 3311.734781][T11170] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3311.742772][T11170] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3311.750760][T11170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3311.758744][T11170] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3311.766738][T11170] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3311.774776][T11250] CPU: 0 PID: 11250 Comm: syz-executor.0 Not tainted 5.1.0+ #9 [ 3311.782343][T11250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3311.792409][T11250] Call Trace: [ 3311.795717][T11250] dump_stack+0x172/0x1f0 [ 3311.800077][T11250] should_fail.cold+0xa/0x15 [ 3311.804712][T11250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3311.810565][T11250] ? ___might_sleep+0x163/0x280 [ 3311.815443][T11250] __should_failslab+0x121/0x190 [ 3311.820404][T11250] should_failslab+0x9/0x14 [ 3311.824964][T11250] kmem_cache_alloc_node_trace+0x270/0x720 [ 3311.830826][T11250] ? kasan_unpoison_shadow+0x35/0x50 [ 3311.836149][T11250] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 18:59:39 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x3) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3311.842001][T11250] __kmalloc_node+0x3d/0x70 [ 3311.846536][T11250] kvmalloc_node+0x68/0x100 [ 3311.851070][T11250] alloc_fdtable+0x142/0x290 [ 3311.855690][T11250] dup_fd+0x743/0xb30 [ 3311.859721][T11250] unshare_fd+0x160/0x1d0 [ 3311.864082][T11250] ? pidfd_release+0x50/0x50 [ 3311.868699][T11250] ? find_held_lock+0x35/0x130 [ 3311.873493][T11250] ? cache_grow_end+0xa4/0x190 [ 3311.878296][T11250] unshare_files+0x7f/0x1f0 [ 3311.882837][T11250] ? __ia32_sys_unshare+0x40/0x40 [ 3311.887911][T11250] __do_execve_file.isra.0+0x27e/0x23a0 [ 3311.893485][T11250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3311.899754][T11250] ? __phys_addr_symbol+0x30/0x70 [ 3311.904799][T11250] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3311.910549][T11250] ? __check_object_size+0x3d/0x42f [ 3311.915790][T11250] ? copy_strings_kernel+0x110/0x110 [ 3311.921107][T11250] ? strncpy_from_user+0x2ac/0x380 [ 3311.926251][T11250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3311.932527][T11250] __ia32_compat_sys_execveat+0xf3/0x140 [ 3311.938185][T11250] do_fast_syscall_32+0x281/0xd54 [ 3311.943233][T11250] entry_SYSENTER_compat+0x70/0x7f [ 3311.949155][T11250] RIP: 0023:0xf7f19849 [ 3311.953238][T11250] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3311.972862][T11250] RSP: 002b:00000000f5d150cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3311.981290][T11250] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3311.989278][T11250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3311.997263][T11250] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3312.005244][T11250] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3312.013233][T11250] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000236, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6c000000) 18:59:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000042d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:39 executing program 3 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6c010000) 18:59:39 executing program 0 (fault-call:5 fault-nth:6): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6d000000) [ 3312.307204][T11402] FAULT_INJECTION: forcing a failure. [ 3312.307204][T11402] name failslab, interval 1, probability 0, space 0, times 0 [ 3312.335547][T11402] CPU: 0 PID: 11402 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3312.343143][T11402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3312.353216][T11402] Call Trace: [ 3312.356539][T11402] dump_stack+0x172/0x1f0 [ 3312.360909][T11402] should_fail.cold+0xa/0x15 [ 3312.365543][T11402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3312.371392][T11402] ? ___might_sleep+0x163/0x280 [ 3312.376266][T11402] __should_failslab+0x121/0x190 [ 3312.381225][T11402] should_failslab+0x9/0x14 [ 3312.385751][T11402] kmem_cache_alloc_node_trace+0x270/0x720 [ 3312.391594][T11402] __kmalloc_node+0x3d/0x70 [ 3312.396115][T11402] kvmalloc_node+0x68/0x100 [ 3312.400648][T11402] alloc_fdtable+0xd6/0x290 [ 3312.405184][T11402] dup_fd+0x743/0xb30 [ 3312.409205][T11402] unshare_fd+0x160/0x1d0 [ 3312.413562][T11402] ? pidfd_release+0x50/0x50 [ 3312.418191][T11402] ? find_held_lock+0x35/0x130 [ 3312.422991][T11402] ? cache_grow_end+0xa4/0x190 [ 3312.427793][T11402] unshare_files+0x7f/0x1f0 [ 3312.432327][T11402] ? __ia32_sys_unshare+0x40/0x40 [ 3312.437394][T11402] __do_execve_file.isra.0+0x27e/0x23a0 [ 3312.442971][T11402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3312.449276][T11402] ? __phys_addr_symbol+0x30/0x70 [ 3312.454320][T11402] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3312.460055][T11402] ? __check_object_size+0x3d/0x42f [ 3312.465281][T11402] ? copy_strings_kernel+0x110/0x110 [ 3312.470589][T11402] ? strncpy_from_user+0x2ac/0x380 [ 3312.475732][T11402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3312.482044][T11402] __ia32_compat_sys_execveat+0xf3/0x140 [ 3312.487722][T11402] do_fast_syscall_32+0x281/0xd54 [ 3312.492787][T11402] entry_SYSENTER_compat+0x70/0x7f [ 3312.497911][T11402] RIP: 0023:0xf7f8a849 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6d010000) 18:59:39 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3312.502004][T11402] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3312.521635][T11402] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3312.530068][T11402] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3312.538076][T11402] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3312.546168][T11402] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3312.554167][T11402] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3312.562259][T11402] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000042e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6e000000) 18:59:39 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000237, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:39 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6e010000) 18:59:39 executing program 3 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:40 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='fd/3\x00') write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xe, 0x3, 0x5, 0x5e4, 0x74, "1148c91833fdd4157d9c664d4d087f5a1e4127ccfb9dac643e74926907e279875cc2a0196a4d59e169561f6e941d90600ea2d17e1c6110658ece06253401326d1baf6cf60d8bca9c952d9c59268cffecbd70605f843d9d2ba65ab50c00e7e3356b22de5021ca08d467f9b2dc62fd8bf08eb4f4be"}, 0x80) write$binfmt_elf32(r0, 0x0, 0x1f2) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='system\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='ns/mnt\x00'], &(0x7f0000000240)=[&(0x7f0000000200)='\x00']) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3312.833833][T11746] FAULT_INJECTION: forcing a failure. [ 3312.833833][T11746] name failslab, interval 1, probability 0, space 0, times 0 [ 3312.870882][T11746] CPU: 0 PID: 11746 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3312.879104][T11746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3312.889178][T11746] Call Trace: [ 3312.892489][T11746] dump_stack+0x172/0x1f0 [ 3312.896851][T11746] should_fail.cold+0xa/0x15 [ 3312.901470][T11746] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3312.907305][T11746] ? ___might_sleep+0x163/0x280 [ 3312.912184][T11746] __should_failslab+0x121/0x190 [ 3312.917140][T11746] should_failslab+0x9/0x14 [ 3312.921659][T11746] kmem_cache_alloc_node_trace+0x270/0x720 [ 3312.927486][T11746] ? kasan_unpoison_shadow+0x35/0x50 [ 3312.932791][T11746] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3312.938673][T11746] __kmalloc_node+0x3d/0x70 [ 3312.943193][T11746] kvmalloc_node+0x68/0x100 [ 3312.947716][T11746] alloc_fdtable+0x142/0x290 [ 3312.952325][T11746] dup_fd+0x743/0xb30 [ 3312.956340][T11746] unshare_fd+0x160/0x1d0 [ 3312.960684][T11746] ? pidfd_release+0x50/0x50 [ 3312.965304][T11746] unshare_files+0x7f/0x1f0 [ 3312.969836][T11746] ? __ia32_sys_unshare+0x40/0x40 [ 3312.974894][T11746] __do_execve_file.isra.0+0x27e/0x23a0 [ 3312.980464][T11746] ? retint_kernel+0x2b/0x2b [ 3312.985087][T11746] ? copy_strings_kernel+0x110/0x110 [ 3312.990391][T11746] ? getname_flags+0x194/0x5b0 [ 3312.995176][T11746] ? getname_flags+0x3c4/0x5b0 [ 3312.999961][T11746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3313.006236][T11746] __ia32_compat_sys_execveat+0xf3/0x140 [ 3313.011898][T11746] do_fast_syscall_32+0x281/0xd54 [ 3313.016947][T11746] entry_SYSENTER_compat+0x70/0x7f [ 3313.022093][T11746] RIP: 0023:0xf7f8a849 18:59:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000042f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6f000000) [ 3313.026184][T11746] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3313.045804][T11746] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3313.054233][T11746] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3313.062226][T11746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3313.070210][T11746] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3313.078196][T11746] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3313.086181][T11746] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:40 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) 18:59:40 executing program 3 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x6f010000) 18:59:40 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000001180)=""/4096) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x70000000) [ 3313.377040][T11881] FAULT_INJECTION: forcing a failure. [ 3313.377040][T11881] name failslab, interval 1, probability 0, space 0, times 0 [ 3313.404980][T11881] CPU: 0 PID: 11881 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3313.412584][T11881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3313.422651][T11881] Call Trace: [ 3313.425968][T11881] dump_stack+0x172/0x1f0 [ 3313.430336][T11881] should_fail.cold+0xa/0x15 [ 3313.434959][T11881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3313.440799][T11881] ? ___might_sleep+0x163/0x280 [ 3313.445675][T11881] __should_failslab+0x121/0x190 [ 3313.450635][T11881] should_failslab+0x9/0x14 [ 3313.455157][T11881] kmem_cache_alloc_trace+0x2d1/0x760 [ 3313.460552][T11881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3313.466033][T11881] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3313.471334][T11881] ? retint_kernel+0x2b/0x2b [ 3313.475948][T11881] ? trace_hardirqs_on_caller+0x6a/0x220 [ 3313.481609][T11881] __do_execve_file.isra.0+0x325/0x23a0 [ 3313.487186][T11881] ? copy_strings_kernel+0x110/0x110 [ 3313.492498][T11881] __ia32_compat_sys_execveat+0xf3/0x140 [ 3313.498159][T11881] do_fast_syscall_32+0x281/0xd54 [ 3313.503207][T11881] entry_SYSENTER_compat+0x70/0x7f [ 3313.508359][T11881] RIP: 0023:0xf7f8a849 [ 3313.512446][T11881] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3313.532070][T11881] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3313.540502][T11881] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3313.548494][T11881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3313.556486][T11881] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3313.564483][T11881] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 18:59:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x70010000) [ 3313.572468][T11881] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:40 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x71000000) 18:59:40 executing program 3 (fault-call:2 fault-nth:7): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:40 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) 18:59:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000431, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x71010000) [ 3313.808545][T12129] FAULT_INJECTION: forcing a failure. [ 3313.808545][T12129] name failslab, interval 1, probability 0, space 0, times 0 [ 3313.862980][T12129] CPU: 0 PID: 12129 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3313.870579][T12129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3313.880646][T12129] Call Trace: [ 3313.883962][T12129] dump_stack+0x172/0x1f0 [ 3313.888334][T12129] should_fail.cold+0xa/0x15 [ 3313.892951][T12129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3313.898788][T12129] ? ___might_sleep+0x163/0x280 [ 3313.903663][T12129] __should_failslab+0x121/0x190 [ 3313.908620][T12129] should_failslab+0x9/0x14 [ 3313.913140][T12129] kmem_cache_alloc+0x2b2/0x6f0 [ 3313.918026][T12129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3313.924304][T12129] ? __validate_process_creds+0x22d/0x380 [ 3313.930044][T12129] prepare_creds+0x3e/0x3f0 [ 3313.934567][T12129] prepare_exec_creds+0x12/0xf0 [ 3313.939442][T12129] __do_execve_file.isra.0+0x393/0x23a0 [ 3313.945043][T12129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3313.951313][T12129] ? __phys_addr_symbol+0x30/0x70 [ 3313.956372][T12129] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3313.962128][T12129] ? __check_object_size+0x3d/0x42f [ 3313.967380][T12129] ? copy_strings_kernel+0x110/0x110 [ 3313.972681][T12129] ? strncpy_from_user+0x2ac/0x380 [ 3313.977817][T12129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3313.984087][T12129] __ia32_compat_sys_execveat+0xf3/0x140 [ 3313.989762][T12129] do_fast_syscall_32+0x281/0xd54 [ 3313.994821][T12129] entry_SYSENTER_compat+0x70/0x7f [ 3313.999947][T12129] RIP: 0023:0xf7f8a849 [ 3314.004039][T12129] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3314.023660][T12129] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3314.032095][T12129] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3314.040076][T12129] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3314.048061][T12129] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3314.056053][T12129] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 18:59:41 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') fanotify_init(0x4, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r2, 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000200)=""/7) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, 0xea) 18:59:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x72000000) 18:59:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000239, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 3314.064047][T12129] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x72010000) 18:59:41 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) 18:59:41 executing program 3 (fault-call:2 fault-nth:8): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x73000000) 18:59:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000432, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:41 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x73010000) 18:59:41 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3314.480465][T12514] FAULT_INJECTION: forcing a failure. [ 3314.480465][T12514] name failslab, interval 1, probability 0, space 0, times 0 [ 3314.510645][T12514] CPU: 0 PID: 12514 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3314.518243][T12514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3314.528314][T12514] Call Trace: [ 3314.531622][T12514] dump_stack+0x172/0x1f0 [ 3314.535989][T12514] should_fail.cold+0xa/0x15 [ 3314.540611][T12514] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3314.546440][T12514] ? ___might_sleep+0x163/0x280 [ 3314.551318][T12514] __should_failslab+0x121/0x190 [ 3314.556277][T12514] should_failslab+0x9/0x14 [ 3314.560796][T12514] __kmalloc+0x2dc/0x740 [ 3314.565057][T12514] ? refcount_inc_not_zero_checked+0x144/0x200 [ 3314.571264][T12514] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 3314.577093][T12514] ? security_prepare_creds+0x123/0x190 [ 3314.582657][T12514] security_prepare_creds+0x123/0x190 [ 3314.588069][T12514] prepare_creds+0x2f5/0x3f0 [ 3314.596682][T12514] prepare_exec_creds+0x12/0xf0 [ 3314.601561][T12514] __do_execve_file.isra.0+0x393/0x23a0 [ 3314.607142][T12514] ? copy_strings_kernel+0x110/0x110 [ 3314.612451][T12514] ? strncpy_from_user+0x2ac/0x380 [ 3314.617586][T12514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3314.623849][T12514] __ia32_compat_sys_execveat+0xf3/0x140 [ 3314.629515][T12514] do_fast_syscall_32+0x281/0xd54 [ 3314.634573][T12514] entry_SYSENTER_compat+0x70/0x7f [ 3314.639697][T12514] RIP: 0023:0xf7f8a849 [ 3314.643787][T12514] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3314.663497][T12514] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3314.671933][T12514] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 18:59:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000433, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3314.679923][T12514] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3314.688379][T12514] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3314.696362][T12514] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3314.704340][T12514] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:41 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) 18:59:42 executing program 3 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x74000000) 18:59:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000023a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000434, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x74010000) [ 3314.938284][T12602] FAULT_INJECTION: forcing a failure. [ 3314.938284][T12602] name failslab, interval 1, probability 0, space 0, times 0 [ 3314.985386][T12602] CPU: 0 PID: 12602 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3314.993002][T12602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3315.003069][T12602] Call Trace: [ 3315.006388][T12602] dump_stack+0x172/0x1f0 [ 3315.010755][T12602] should_fail.cold+0xa/0x15 [ 3315.015364][T12602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3315.021196][T12602] ? ___might_sleep+0x163/0x280 [ 3315.026065][T12602] __should_failslab+0x121/0x190 [ 3315.031023][T12602] should_failslab+0x9/0x14 [ 3315.035555][T12602] kmem_cache_alloc+0x2b2/0x6f0 [ 3315.040419][T12602] ? rcu_read_lock_sched_held+0x110/0x130 [ 3315.046158][T12602] ? kmem_cache_alloc+0x32e/0x6f0 [ 3315.051253][T12602] security_file_alloc+0x39/0x170 [ 3315.056298][T12602] __alloc_file+0xac/0x300 [ 3315.060733][T12602] alloc_empty_file+0x72/0x170 [ 3315.065514][T12602] path_openat+0xef/0x46e0 [ 3315.069952][T12602] ? stack_trace_save+0xac/0xe0 [ 3315.074839][T12602] ? stack_trace_consume_entry+0x190/0x190 [ 3315.080668][T12602] ? stack_trace_save+0xac/0xe0 [ 3315.085546][T12602] ? save_stack+0x5c/0x90 [ 3315.089900][T12602] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3315.095287][T12602] ? __kmalloc+0x15c/0x740 [ 3315.099716][T12602] ? security_prepare_creds+0x123/0x190 [ 3315.105280][T12602] ? prepare_creds+0x2f5/0x3f0 [ 3315.110058][T12602] ? prepare_exec_creds+0x12/0xf0 [ 3315.115098][T12602] ? __do_execve_file.isra.0+0x393/0x23a0 [ 3315.120834][T12602] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 3315.126652][T12602] ? do_fast_syscall_32+0x281/0xd54 18:59:42 executing program 2: r0 = memfd_create(&(0x7f00000002c0)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x1, 0x1000, 0x1108, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f00000000c0)=""/86) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r2, &(0x7f00000001c0)="7f89fd505fe77bd599c12a7f650f9bbefb5f4e508cb01b6ce609d52b91ddee4aca91bad95d9ac43f747a0ed5ecb5e67a682d31f7605076edd31847f4f0c8481c941be9ca13e1ca316e877805279eb1a736c2f78c73571799edabb32c3083116873feb8991ebef39fa62d28d2c0300d4f73107aca582b8990f0de72708858e5a05c3f4d8015e4e5134486ba5c66871c675a1ffbf7356cca8e6f10e9124fda5b1c361604c4d39bc61597bcd759bc664096dc18f2e4a56cacae79ca82c8aefe41"}, 0x10) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3315.131864][T12602] ? entry_SYSENTER_compat+0x70/0x7f [ 3315.137167][T12602] ? debug_smp_processor_id+0x3c/0x280 [ 3315.142645][T12602] ? perf_trace_lock+0xeb/0x4c0 [ 3315.147549][T12602] do_filp_open+0x1a1/0x280 [ 3315.152156][T12602] ? __lockdep_free_key_range+0x120/0x120 [ 3315.157901][T12602] ? may_open_dev+0x100/0x100 [ 3315.162592][T12602] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3315.167893][T12602] ? retint_kernel+0x2b/0x2b [ 3315.172524][T12602] ? trace_hardirqs_on_caller+0x6a/0x220 [ 3315.178187][T12602] ? trace_hardirqs_on_thunk+0x1a/0x1c 18:59:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x75000000) [ 3315.183684][T12602] ? do_open_execat+0xc5/0x690 [ 3315.188468][T12602] do_open_execat+0x137/0x690 [ 3315.193169][T12602] ? unregister_binfmt+0x170/0x170 [ 3315.198302][T12602] ? retint_kernel+0x2b/0x2b [ 3315.202921][T12602] __do_execve_file.isra.0+0x178d/0x23a0 [ 3315.208571][T12602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3315.214057][T12602] ? copy_strings_kernel+0x110/0x110 [ 3315.219369][T12602] __ia32_compat_sys_execveat+0xf3/0x140 [ 3315.225206][T12602] do_fast_syscall_32+0x281/0xd54 [ 3315.230259][T12602] entry_SYSENTER_compat+0x70/0x7f [ 3315.235388][T12602] RIP: 0023:0xf7f8a849 [ 3315.239468][T12602] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3315.259087][T12602] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3315.267516][T12602] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3315.275507][T12602] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 18:59:42 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) [ 3315.283490][T12602] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3315.291483][T12602] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3315.299469][T12602] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x75010000) 18:59:42 executing program 3 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:42 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x76000000) 18:59:42 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000435, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3315.528236][T12989] FAULT_INJECTION: forcing a failure. [ 3315.528236][T12989] name failslab, interval 1, probability 0, space 0, times 0 [ 3315.577340][T12989] CPU: 0 PID: 12989 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3315.584942][T12989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3315.595021][T12989] Call Trace: [ 3315.598340][T12989] dump_stack+0x172/0x1f0 [ 3315.602701][T12989] should_fail.cold+0xa/0x15 [ 3315.607320][T12989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3315.613148][T12989] ? ___might_sleep+0x163/0x280 [ 3315.618031][T12989] __should_failslab+0x121/0x190 [ 3315.623002][T12989] should_failslab+0x9/0x14 [ 3315.627531][T12989] __kmalloc_track_caller+0x2d8/0x740 [ 3315.632924][T12989] ? pointer+0x870/0x870 [ 3315.637674][T12989] ? stop_one_cpu+0x114/0x170 [ 3315.642374][T12989] ? multi_cpu_stop+0x4d0/0x4d0 [ 3315.647279][T12989] ? kasprintf+0xbb/0xf0 [ 3315.651534][T12989] kvasprintf+0xc8/0x170 [ 3315.655790][T12989] ? bust_spinlocks+0xe0/0xe0 [ 3315.660485][T12989] kasprintf+0xbb/0xf0 [ 3315.664564][T12989] ? kvasprintf_const+0x190/0x190 [ 3315.669608][T12989] ? nr_iowait+0x130/0x130 [ 3315.674035][T12989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3315.680284][T12989] ? kasan_check_read+0x11/0x20 [ 3315.685153][T12989] __do_execve_file.isra.0+0x94b/0x23a0 [ 3315.690730][T12989] ? copy_strings_kernel+0x110/0x110 [ 3315.696023][T12989] ? strncpy_from_user+0x2ac/0x380 [ 3315.701149][T12989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3315.707405][T12989] __ia32_compat_sys_execveat+0xf3/0x140 [ 3315.713051][T12989] do_fast_syscall_32+0x281/0xd54 [ 3315.718089][T12989] entry_SYSENTER_compat+0x70/0x7f [ 3315.723199][T12989] RIP: 0023:0xf7f8a849 [ 3315.727268][T12989] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3315.746887][T12989] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3315.755310][T12989] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3315.763285][T12989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3315.771261][T12989] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3315.779261][T12989] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3315.787239][T12989] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) 18:59:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000023b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x76010000) 18:59:43 executing program 3 (fault-call:2 fault-nth:11): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x77000000) [ 3316.059426][T13200] FAULT_INJECTION: forcing a failure. [ 3316.059426][T13200] name failslab, interval 1, probability 0, space 0, times 0 [ 3316.082195][T13200] CPU: 1 PID: 13200 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3316.089804][T13200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3316.099877][T13200] Call Trace: [ 3316.103187][T13200] dump_stack+0x172/0x1f0 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x77010000) [ 3316.107548][T13200] should_fail.cold+0xa/0x15 [ 3316.112174][T13200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3316.118007][T13200] ? ___might_sleep+0x163/0x280 [ 3316.122882][T13200] __should_failslab+0x121/0x190 [ 3316.127836][T13200] should_failslab+0x9/0x14 [ 3316.132366][T13200] kmem_cache_alloc+0x2b2/0x6f0 [ 3316.137237][T13200] ? nr_iowait+0x130/0x130 [ 3316.141678][T13200] ? ___preempt_schedule+0x16/0x18 [ 3316.146818][T13200] mm_alloc+0x1d/0xd0 [ 3316.150822][T13200] __do_execve_file.isra.0+0xaa3/0x23a0 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x78000000) 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x78010000) [ 3316.156392][T13200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3316.162658][T13200] ? copy_strings_kernel+0x110/0x110 [ 3316.167965][T13200] ? strncpy_from_user+0x2ac/0x380 [ 3316.173100][T13200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3316.179362][T13200] __ia32_compat_sys_execveat+0xf3/0x140 [ 3316.185021][T13200] do_fast_syscall_32+0x281/0xd54 [ 3316.190070][T13200] entry_SYSENTER_compat+0x70/0x7f [ 3316.195189][T13200] RIP: 0023:0xf7f8a849 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x79000000) [ 3316.199270][T13200] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3316.218909][T13200] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3316.227342][T13200] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3316.235329][T13200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3316.243320][T13200] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3316.251304][T13200] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x79010000) [ 3316.259290][T13200] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000436, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7a000000) 18:59:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000023c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:43 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) preadv(r1, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/40, 0x28}, {&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/84, 0x54}, {&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/251, 0xfb}, {&(0x7f00000013c0)=""/23, 0x17}, {&(0x7f0000001400)=""/112, 0x70}, {&(0x7f0000001480)=""/56, 0x38}], 0x9, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:43 executing program 3 (fault-call:2 fault-nth:12): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7a010000) 18:59:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) 18:59:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000437, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3316.642435][T13542] FAULT_INJECTION: forcing a failure. [ 3316.642435][T13542] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3316.690829][T13542] CPU: 1 PID: 13542 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3316.698428][T13542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3316.708508][T13542] Call Trace: [ 3316.711818][T13542] dump_stack+0x172/0x1f0 [ 3316.716183][T13542] should_fail.cold+0xa/0x15 [ 3316.720804][T13542] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3316.726635][T13542] ? ___might_sleep+0x163/0x280 [ 3316.731519][T13542] should_fail_alloc_page+0x50/0x60 18:59:43 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7b000000) [ 3316.736743][T13542] __alloc_pages_nodemask+0x1a1/0x8d0 [ 3316.742132][T13542] ? mark_held_locks+0xa4/0xf0 [ 3316.747027][T13542] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3316.752775][T13542] ? mark_held_locks+0xa4/0xf0 [ 3316.757565][T13542] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3316.762874][T13542] ? retint_kernel+0x2b/0x2b [ 3316.767492][T13542] ? trace_hardirqs_on_caller+0x6a/0x220 [ 3316.773143][T13542] ? percpu_ref_put_many+0x94/0x190 [ 3316.778356][T13542] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3316.784619][T13542] alloc_pages_current+0x107/0x210 [ 3316.789754][T13542] __get_free_pages+0xc/0x40 [ 3316.794366][T13542] pgd_alloc+0x8b/0x3f0 [ 3316.798543][T13542] ? pgd_page_get_mm+0x40/0x40 [ 3316.803322][T13542] ? lockdep_init_map+0x1be/0x6d0 [ 3316.808361][T13542] ? lockdep_init_map+0x1be/0x6d0 [ 3316.813415][T13542] mm_init+0x590/0x9b0 [ 3316.817517][T13542] mm_alloc+0xa6/0xd0 [ 3316.821528][T13542] __do_execve_file.isra.0+0xaa3/0x23a0 [ 3316.827105][T13542] ? copy_strings_kernel+0x110/0x110 [ 3316.832407][T13542] ? getname_flags+0x194/0x5b0 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7b010000) [ 3316.837189][T13542] ? getname_flags+0x3c4/0x5b0 [ 3316.841969][T13542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3316.848229][T13542] __ia32_compat_sys_execveat+0xf3/0x140 [ 3316.853889][T13542] do_fast_syscall_32+0x281/0xd54 [ 3316.858943][T13542] entry_SYSENTER_compat+0x70/0x7f [ 3316.864068][T13542] RIP: 0023:0xf7f8a849 [ 3316.868152][T13542] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7c000000) [ 3316.887780][T13542] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3316.896215][T13542] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3316.904201][T13542] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3316.912194][T13542] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3316.920186][T13542] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3316.928168][T13542] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:44 executing program 3 (fault-call:2 fault-nth:13): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7c010000) 18:59:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000438, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000023d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 3317.126285][T13799] FAULT_INJECTION: forcing a failure. [ 3317.126285][T13799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3317.178818][T13799] CPU: 1 PID: 13799 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3317.186420][T13799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3317.196496][T13799] Call Trace: [ 3317.199828][T13799] dump_stack+0x172/0x1f0 [ 3317.204187][T13799] should_fail.cold+0xa/0x15 [ 3317.208812][T13799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3317.214644][T13799] ? ___might_sleep+0x163/0x280 [ 3317.219539][T13799] should_fail_alloc_page+0x50/0x60 18:59:44 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x100000001, 0x8000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:44 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7d000000) [ 3317.224792][T13799] __alloc_pages_nodemask+0x1a1/0x8d0 [ 3317.230186][T13799] ? retint_kernel+0x2b/0x2b [ 3317.234823][T13799] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3317.240600][T13799] ? __sanitizer_cov_trace_const_cmp2+0x1/0x20 [ 3317.249126][T13799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3317.255520][T13799] alloc_pages_current+0x107/0x210 [ 3317.260651][T13799] __get_free_pages+0xc/0x40 [ 3317.265263][T13799] pgd_alloc+0x8b/0x3f0 [ 3317.269444][T13799] ? pgd_page_get_mm+0x40/0x40 [ 3317.274227][T13799] ? lockdep_init_map+0x1be/0x6d0 [ 3317.279262][T13799] ? lockdep_init_map+0x1be/0x6d0 [ 3317.284306][T13799] mm_init+0x590/0x9b0 [ 3317.288391][T13799] mm_alloc+0xa6/0xd0 [ 3317.292416][T13799] __do_execve_file.isra.0+0xaa3/0x23a0 [ 3317.297994][T13799] ? copy_strings_kernel+0x110/0x110 [ 3317.303295][T13799] ? getname_flags+0x194/0x5b0 [ 3317.308079][T13799] ? getname_flags+0x3c4/0x5b0 [ 3317.312871][T13799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3317.319135][T13799] __ia32_compat_sys_execveat+0xf3/0x140 [ 3317.324802][T13799] do_fast_syscall_32+0x281/0xd54 [ 3317.329859][T13799] entry_SYSENTER_compat+0x70/0x7f [ 3317.335018][T13799] RIP: 0023:0xf7f8a849 [ 3317.339107][T13799] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3317.358737][T13799] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3317.367172][T13799] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3317.375164][T13799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3317.383154][T13799] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3317.391233][T13799] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3317.399226][T13799] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7d010000) 18:59:44 executing program 3 (fault-call:2 fault-nth:14): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:44 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8020000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, r2, 0x711, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe6e3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20400000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x376e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffe01}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000084) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x2, 0x80000) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000800)={0x5, 0x0, [{}, {}, {}, {}, {}]}) utimensat(r3, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000400)={"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"}) 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7e000000) 18:59:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000439, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:44 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7e010000) [ 3317.674252][T14011] FAULT_INJECTION: forcing a failure. [ 3317.674252][T14011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3317.739256][T14011] CPU: 1 PID: 14011 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3317.746860][T14011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3317.756926][T14011] Call Trace: [ 3317.760239][T14011] dump_stack+0x172/0x1f0 [ 3317.764600][T14011] should_fail.cold+0xa/0x15 [ 3317.769228][T14011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3317.775055][T14011] ? ___might_sleep+0x163/0x280 [ 3317.779942][T14011] should_fail_alloc_page+0x50/0x60 18:59:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7f000000) [ 3317.785165][T14011] __alloc_pages_nodemask+0x1a1/0x8d0 [ 3317.790560][T14011] ? perf_trace_lock+0xeb/0x4c0 [ 3317.795434][T14011] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3317.801174][T14011] ? __lockdep_free_key_range+0x120/0x120 [ 3317.806922][T14011] ? __lock_acquire+0x54f/0x5490 [ 3317.811870][T14011] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3317.818126][T14011] alloc_pages_current+0x107/0x210 [ 3317.823255][T14011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3317.829519][T14011] get_zeroed_page+0x14/0x50 [ 3317.834127][T14011] __pud_alloc+0x3b/0x250 18:59:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) [ 3317.838486][T14011] __handle_mm_fault+0x7a5/0x3ec0 [ 3317.843538][T14011] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3317.849100][T14011] ? find_held_lock+0x35/0x130 [ 3317.853880][T14011] ? handle_mm_fault+0x322/0xb30 [ 3317.858847][T14011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3317.865108][T14011] ? kasan_check_read+0x11/0x20 [ 3317.869980][T14011] handle_mm_fault+0x43f/0xb30 [ 3317.874770][T14011] __get_user_pages+0x7b6/0x1a40 [ 3317.879740][T14011] ? follow_page_mask+0x19a0/0x19a0 [ 3317.884962][T14011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3317.890459][T14011] get_user_pages_remote+0x21d/0x440 [ 3317.895788][T14011] copy_strings.isra.0+0x3dc/0x890 [ 3317.900929][T14011] ? remove_arg_zero+0x590/0x590 [ 3317.905883][T14011] ? prepare_binprm+0x6aa/0x940 [ 3317.910764][T14011] ? vma_link+0x117/0x180 [ 3317.915116][T14011] ? install_exec_creds+0x180/0x180 [ 3317.920342][T14011] copy_strings_kernel+0xa5/0x110 [ 3317.925393][T14011] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3317.931053][T14011] ? copy_strings_kernel+0x110/0x110 [ 3317.936352][T14011] ? strncpy_from_user+0x2ac/0x380 [ 3317.941492][T14011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3317.947751][T14011] __ia32_compat_sys_execveat+0xf3/0x140 [ 3317.953418][T14011] do_fast_syscall_32+0x281/0xd54 [ 3317.958481][T14011] entry_SYSENTER_compat+0x70/0x7f [ 3317.963622][T14011] RIP: 0023:0xf7f8a849 [ 3317.967712][T14011] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3317.987331][T14011] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3317.995756][T14011] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3318.003740][T14011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3318.011730][T14011] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3318.019719][T14011] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3318.027717][T14011] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000023e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x7f010000) 18:59:45 executing program 2: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/77) 18:59:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000043a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) 18:59:45 executing program 3 (fault-call:2 fault-nth:15): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x80010000) [ 3318.314318][T14210] FAULT_INJECTION: forcing a failure. [ 3318.314318][T14210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3318.350071][T14210] CPU: 1 PID: 14210 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3318.357667][T14210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3318.367746][T14210] Call Trace: [ 3318.371060][T14210] dump_stack+0x172/0x1f0 [ 3318.375423][T14210] should_fail.cold+0xa/0x15 [ 3318.380053][T14210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3318.385881][T14210] ? ___might_sleep+0x163/0x280 [ 3318.390757][T14210] should_fail_alloc_page+0x50/0x60 [ 3318.395977][T14210] __alloc_pages_nodemask+0x1a1/0x8d0 [ 3318.401375][T14210] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3318.407120][T14210] ? mark_held_locks+0xa4/0xf0 [ 3318.411907][T14210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3318.417384][T14210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3318.422856][T14210] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3318.429206][T14210] alloc_pages_current+0x107/0x210 [ 3318.434336][T14210] get_zeroed_page+0x14/0x50 [ 3318.438944][T14210] __pud_alloc+0x3b/0x250 [ 3318.443294][T14210] __handle_mm_fault+0x7a5/0x3ec0 [ 3318.448338][T14210] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3318.453909][T14210] ? lock_release+0x4c1/0xa00 [ 3318.458616][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:59:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x81000000) [ 3318.464876][T14210] ? kasan_check_read+0x11/0x20 [ 3318.469750][T14210] handle_mm_fault+0x43f/0xb30 [ 3318.474541][T14210] __get_user_pages+0x7b6/0x1a40 [ 3318.479516][T14210] ? follow_page_mask+0x19a0/0x19a0 [ 3318.484742][T14210] ? retint_kernel+0x2b/0x2b [ 3318.489366][T14210] get_user_pages_remote+0x21d/0x440 [ 3318.494681][T14210] copy_strings.isra.0+0x3dc/0x890 [ 3318.499835][T14210] ? remove_arg_zero+0x590/0x590 [ 3318.504788][T14210] ? prepare_binprm+0x6aa/0x940 [ 3318.509659][T14210] ? vma_link+0x117/0x180 [ 3318.514017][T14210] ? install_exec_creds+0x180/0x180 [ 3318.519242][T14210] copy_strings_kernel+0xa5/0x110 [ 3318.524288][T14210] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3318.529952][T14210] ? copy_strings_kernel+0x110/0x110 [ 3318.535250][T14210] ? strncpy_from_user+0x2ac/0x380 [ 3318.540384][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3318.546649][T14210] __ia32_compat_sys_execveat+0xf3/0x140 [ 3318.552316][T14210] do_fast_syscall_32+0x281/0xd54 [ 3318.557369][T14210] entry_SYSENTER_compat+0x70/0x7f 18:59:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) [ 3318.562506][T14210] RIP: 0023:0xf7f8a849 [ 3318.566591][T14210] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3318.586297][T14210] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3318.594731][T14210] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3318.602721][T14210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3318.610714][T14210] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3318.618711][T14210] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3318.626781][T14210] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:45 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = dup(r1) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000100)={0x1ff, 0x0, &(0x7f0000ffa000/0x3000)=nil}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000180)={0xffff, 0x0, 0x3017, 0xffffffffffffffff, 0x1000, 0x4, 0x1f, 0x1}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f00000000c0)=0x5) 18:59:45 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x81010000) 18:59:45 executing program 3 (fault-call:2 fault-nth:16): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3318.841493][T14520] FAULT_INJECTION: forcing a failure. [ 3318.841493][T14520] name failslab, interval 1, probability 0, space 0, times 0 [ 3318.862412][T14520] CPU: 1 PID: 14520 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3318.869986][T14520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3318.880059][T14520] Call Trace: [ 3318.883407][T14520] dump_stack+0x172/0x1f0 [ 3318.887778][T14520] should_fail.cold+0xa/0x15 [ 3318.892398][T14520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3318.898235][T14520] ? ___might_sleep+0x163/0x280 [ 3318.903110][T14520] __should_failslab+0x121/0x190 [ 3318.908059][T14520] should_failslab+0x9/0x14 [ 3318.912582][T14520] kmem_cache_alloc+0x2b2/0x6f0 [ 3318.917452][T14520] ? alloc_pages_current+0x10f/0x210 [ 3318.922789][T14520] __pmd_alloc+0xc9/0x460 [ 3318.927137][T14520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3318.933399][T14520] __handle_mm_fault+0x192a/0x3ec0 [ 3318.938534][T14520] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3318.944092][T14520] ? find_held_lock+0x35/0x130 [ 3318.948871][T14520] ? handle_mm_fault+0x322/0xb30 [ 3318.953857][T14520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3318.960123][T14520] ? kasan_check_read+0x11/0x20 [ 3318.964990][T14520] handle_mm_fault+0x43f/0xb30 [ 3318.969785][T14520] __get_user_pages+0x7b6/0x1a40 [ 3318.974749][T14520] ? follow_page_mask+0x19a0/0x19a0 [ 3318.979969][T14520] get_user_pages_remote+0x21d/0x440 [ 3318.985275][T14520] copy_strings.isra.0+0x3dc/0x890 [ 3318.990406][T14520] ? remove_arg_zero+0x590/0x590 [ 3318.995354][T14520] ? prepare_binprm+0x6aa/0x940 [ 3319.000214][T14520] ? install_exec_creds+0x180/0x180 [ 3319.005421][T14520] copy_strings_kernel+0xa5/0x110 [ 3319.010464][T14520] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3319.016129][T14520] ? copy_strings_kernel+0x110/0x110 [ 3319.021436][T14520] __ia32_compat_sys_execveat+0xf3/0x140 [ 3319.027091][T14520] do_fast_syscall_32+0x281/0xd54 [ 3319.032131][T14520] entry_SYSENTER_compat+0x70/0x7f [ 3319.037241][T14520] RIP: 0023:0xf7f8a849 [ 3319.041308][T14520] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3319.060911][T14520] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3319.069326][T14520] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3319.077318][T14520] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3319.085294][T14520] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3319.093270][T14520] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3319.101289][T14520] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000023f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000043b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x82000000) 18:59:46 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) 18:59:46 executing program 3 (fault-call:2 fault-nth:17): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:46 executing program 2: r0 = socket$inet6(0xa, 0xf, 0x4) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e22, @local}}) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000180)=""/121) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x82010000) 18:59:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x83000000) [ 3319.311612][T14732] FAULT_INJECTION: forcing a failure. [ 3319.311612][T14732] name failslab, interval 1, probability 0, space 0, times 0 [ 3319.373373][T14732] CPU: 0 PID: 14732 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3319.380979][T14732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3319.391057][T14732] Call Trace: [ 3319.394373][T14732] dump_stack+0x172/0x1f0 [ 3319.398730][T14732] should_fail.cold+0xa/0x15 [ 3319.403344][T14732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3319.409171][T14732] ? ___might_sleep+0x163/0x280 [ 3319.414042][T14732] __should_failslab+0x121/0x190 [ 3319.419008][T14732] should_failslab+0x9/0x14 [ 3319.423533][T14732] kmem_cache_alloc+0x2b2/0x6f0 [ 3319.428402][T14732] ? alloc_pages_current+0x10f/0x210 [ 3319.433709][T14732] __pmd_alloc+0xc9/0x460 [ 3319.438052][T14732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3319.444315][T14732] __handle_mm_fault+0x192a/0x3ec0 [ 3319.449450][T14732] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3319.455026][T14732] ? find_held_lock+0x35/0x130 [ 3319.459842][T14732] ? handle_mm_fault+0x322/0xb30 [ 3319.464810][T14732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:59:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x83010000) 18:59:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000043c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3319.471076][T14732] ? kasan_check_read+0x11/0x20 [ 3319.475955][T14732] handle_mm_fault+0x43f/0xb30 [ 3319.480753][T14732] __get_user_pages+0x7b6/0x1a40 [ 3319.485720][T14732] ? follow_page_mask+0x19a0/0x19a0 [ 3319.490937][T14732] ? retint_kernel+0x2b/0x2b [ 3319.495565][T14732] get_user_pages_remote+0x21d/0x440 [ 3319.500889][T14732] copy_strings.isra.0+0x3dc/0x890 [ 3319.506038][T14732] ? remove_arg_zero+0x590/0x590 [ 3319.511000][T14732] ? prepare_binprm+0x6aa/0x940 [ 3319.515877][T14732] ? vma_link+0x117/0x180 18:59:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x84000000) [ 3319.520245][T14732] ? install_exec_creds+0x180/0x180 [ 3319.525479][T14732] copy_strings_kernel+0xa5/0x110 [ 3319.530542][T14732] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3319.536237][T14732] ? copy_strings_kernel+0x110/0x110 [ 3319.541537][T14732] ? strncpy_from_user+0x2ac/0x380 [ 3319.546670][T14732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3319.552931][T14732] __ia32_compat_sys_execveat+0xf3/0x140 [ 3319.558766][T14732] do_fast_syscall_32+0x281/0xd54 [ 3319.563818][T14732] entry_SYSENTER_compat+0x70/0x7f [ 3319.568944][T14732] RIP: 0023:0xf7f8a849 [ 3319.573033][T14732] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3319.600500][T14732] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3319.608934][T14732] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 18:59:46 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x84010000) [ 3319.616927][T14732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3319.624920][T14732] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3319.632930][T14732] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3319.640912][T14732] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:47 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) 18:59:47 executing program 3 (fault-call:2 fault-nth:18): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x85000000) 18:59:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000043d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:47 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x3a2) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x208000, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x1}}, 0x20) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x800) [ 3319.950775][T15065] FAULT_INJECTION: forcing a failure. [ 3319.950775][T15065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3319.976345][T15065] CPU: 0 PID: 15065 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3319.983929][T15065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3319.994013][T15065] Call Trace: 18:59:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x85010000) [ 3319.997334][T15065] dump_stack+0x172/0x1f0 [ 3320.001690][T15065] should_fail.cold+0xa/0x15 [ 3320.006314][T15065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3320.012138][T15065] ? ___might_sleep+0x163/0x280 [ 3320.017030][T15065] should_fail_alloc_page+0x50/0x60 [ 3320.022247][T15065] __alloc_pages_nodemask+0x1a1/0x8d0 [ 3320.027637][T15065] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3320.033379][T15065] ? kasan_check_write+0x14/0x20 [ 3320.038336][T15065] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3320.044601][T15065] alloc_pages_current+0x107/0x210 [ 3320.049735][T15065] pte_alloc_one+0x1b/0x1a0 [ 3320.054256][T15065] __pte_alloc+0x20/0x310 [ 3320.058606][T15065] __handle_mm_fault+0x3391/0x3ec0 [ 3320.063744][T15065] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3320.069303][T15065] ? find_held_lock+0x35/0x130 [ 3320.074094][T15065] ? handle_mm_fault+0x322/0xb30 [ 3320.079059][T15065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3320.085317][T15065] ? kasan_check_read+0x11/0x20 [ 3320.090195][T15065] handle_mm_fault+0x43f/0xb30 [ 3320.094990][T15065] __get_user_pages+0x7b6/0x1a40 18:59:47 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) [ 3320.099968][T15065] ? follow_page_mask+0x19a0/0x19a0 [ 3320.105213][T15065] get_user_pages_remote+0x21d/0x440 [ 3320.110531][T15065] copy_strings.isra.0+0x3dc/0x890 [ 3320.115676][T15065] ? remove_arg_zero+0x590/0x590 [ 3320.120632][T15065] ? prepare_binprm+0x6aa/0x940 [ 3320.125497][T15065] ? vma_link+0x117/0x180 [ 3320.129848][T15065] ? install_exec_creds+0x180/0x180 [ 3320.135074][T15065] copy_strings_kernel+0xa5/0x110 [ 3320.140128][T15065] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3320.145790][T15065] ? copy_strings_kernel+0x110/0x110 [ 3320.151093][T15065] ? strncpy_from_user+0x2ac/0x380 [ 3320.156227][T15065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3320.162493][T15065] __ia32_compat_sys_execveat+0xf3/0x140 [ 3320.168150][T15065] do_fast_syscall_32+0x281/0xd54 [ 3320.173201][T15065] entry_SYSENTER_compat+0x70/0x7f [ 3320.178323][T15065] RIP: 0023:0xf7f8a849 [ 3320.182412][T15065] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3320.202061][T15065] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3320.210515][T15065] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3320.218505][T15065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3320.226492][T15065] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3320.234477][T15065] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3320.242480][T15065] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:47 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x86000000) 18:59:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000043e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:47 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) 18:59:47 executing program 3 (fault-call:2 fault-nth:19): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3320.513108][T15498] FAULT_INJECTION: forcing a failure. [ 3320.513108][T15498] name failslab, interval 1, probability 0, space 0, times 0 [ 3320.534846][T15498] CPU: 0 PID: 15498 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3320.542455][T15498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3320.552528][T15498] Call Trace: [ 3320.555843][T15498] dump_stack+0x172/0x1f0 [ 3320.560193][T15498] should_fail.cold+0xa/0x15 [ 3320.564801][T15498] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3320.570631][T15498] ? ___might_sleep+0x163/0x280 [ 3320.576228][T15498] __should_failslab+0x121/0x190 [ 3320.581178][T15498] should_failslab+0x9/0x14 [ 3320.585698][T15498] kmem_cache_alloc+0x2b2/0x6f0 [ 3320.590568][T15498] ptlock_alloc+0x20/0x70 [ 3320.594908][T15498] pte_alloc_one+0x6d/0x1a0 [ 3320.599424][T15498] __pte_alloc+0x20/0x310 [ 3320.603800][T15498] __handle_mm_fault+0x3391/0x3ec0 [ 3320.609015][T15498] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3320.614565][T15498] ? find_held_lock+0x35/0x130 [ 3320.619337][T15498] ? handle_mm_fault+0x322/0xb30 [ 3320.624293][T15498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3320.630540][T15498] ? kasan_check_read+0x11/0x20 [ 3320.635401][T15498] handle_mm_fault+0x43f/0xb30 [ 3320.640200][T15498] __get_user_pages+0x7b6/0x1a40 [ 3320.645166][T15498] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3320.650652][T15498] ? follow_page_mask+0x19a0/0x19a0 [ 3320.655884][T15498] get_user_pages_remote+0x21d/0x440 [ 3320.661219][T15498] copy_strings.isra.0+0x3dc/0x890 [ 3320.666349][T15498] ? remove_arg_zero+0x590/0x590 [ 3320.671402][T15498] ? prepare_binprm+0x6aa/0x940 [ 3320.676281][T15498] ? vma_link+0x117/0x180 [ 3320.680638][T15498] ? install_exec_creds+0x180/0x180 [ 3320.686417][T15498] copy_strings_kernel+0xa5/0x110 [ 3320.691477][T15498] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3320.697151][T15498] ? copy_strings_kernel+0x110/0x110 [ 3320.702440][T15498] ? strncpy_from_user+0x2ac/0x380 [ 3320.707562][T15498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3320.713993][T15498] __ia32_compat_sys_execveat+0xf3/0x140 [ 3320.719641][T15498] do_fast_syscall_32+0x281/0xd54 [ 3320.724682][T15498] entry_SYSENTER_compat+0x70/0x7f [ 3320.729883][T15498] RIP: 0023:0xf7f8a849 [ 3320.733982][T15498] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3320.753593][T15498] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3320.762008][T15498] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3320.769985][T15498] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3320.778305][T15498] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3320.786277][T15498] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3320.794249][T15498] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000241, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x86010000) 18:59:48 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x10000000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x40) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f00000000c0)={0x4}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:48 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1009) 18:59:48 executing program 3 (fault-call:2 fault-nth:20): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000043f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x87000000) [ 3321.044673][T15627] FAULT_INJECTION: forcing a failure. [ 3321.044673][T15627] name failslab, interval 1, probability 0, space 0, times 0 [ 3321.069079][T15627] CPU: 1 PID: 15627 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3321.076664][T15627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3321.086742][T15627] Call Trace: [ 3321.090061][T15627] dump_stack+0x172/0x1f0 [ 3321.094421][T15627] should_fail.cold+0xa/0x15 [ 3321.099052][T15627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3321.104897][T15627] ? ___might_sleep+0x163/0x280 [ 3321.109769][T15627] __should_failslab+0x121/0x190 [ 3321.114726][T15627] should_failslab+0x9/0x14 [ 3321.119248][T15627] kmem_cache_alloc+0x2b2/0x6f0 [ 3321.124117][T15627] ? __might_sleep+0x95/0x190 [ 3321.128810][T15627] __anon_vma_prepare+0x62/0x3c0 [ 3321.133754][T15627] ? __pte_alloc+0x1ba/0x310 [ 3321.138359][T15627] __handle_mm_fault+0x34db/0x3ec0 [ 3321.143489][T15627] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3321.149044][T15627] ? lock_release+0x4c1/0xa00 [ 3321.153749][T15627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3321.160019][T15627] ? kasan_check_read+0x11/0x20 [ 3321.164887][T15627] handle_mm_fault+0x43f/0xb30 [ 3321.169668][T15627] __get_user_pages+0x7b6/0x1a40 [ 3321.174636][T15627] ? follow_page_mask+0x19a0/0x19a0 [ 3321.179862][T15627] get_user_pages_remote+0x21d/0x440 [ 3321.185261][T15627] copy_strings.isra.0+0x3dc/0x890 [ 3321.190413][T15627] ? remove_arg_zero+0x590/0x590 [ 3321.195357][T15627] ? prepare_binprm+0x6aa/0x940 [ 3321.200219][T15627] ? install_exec_creds+0x180/0x180 [ 3321.205429][T15627] copy_strings_kernel+0xa5/0x110 [ 3321.210469][T15627] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3321.216133][T15627] ? copy_strings_kernel+0x110/0x110 [ 3321.221421][T15627] ? strncpy_from_user+0x2ac/0x380 [ 3321.226539][T15627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3321.232788][T15627] __ia32_compat_sys_execveat+0xf3/0x140 [ 3321.238438][T15627] do_fast_syscall_32+0x281/0xd54 [ 3321.243493][T15627] entry_SYSENTER_compat+0x70/0x7f [ 3321.248606][T15627] RIP: 0023:0xf7f8a849 [ 3321.252679][T15627] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3321.272300][T15627] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3321.280722][T15627] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3321.288703][T15627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3321.296674][T15627] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3321.304662][T15627] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3321.312647][T15627] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:48 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x4, 0x8000, 0x40, 0x8, 0x3}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x87010000) 18:59:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:48 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1010) 18:59:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x88000000) 18:59:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000242, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:48 executing program 3 (fault-call:2 fault-nth:21): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000441, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:48 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x88010000) [ 3321.802719][T16044] FAULT_INJECTION: forcing a failure. [ 3321.802719][T16044] name failslab, interval 1, probability 0, space 0, times 0 [ 3321.835455][T16044] CPU: 1 PID: 16044 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3321.843094][T16044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3321.853174][T16044] Call Trace: [ 3321.856574][T16044] dump_stack+0x172/0x1f0 [ 3321.860939][T16044] should_fail.cold+0xa/0x15 [ 3321.865569][T16044] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3321.871430][T16044] ? ___might_sleep+0x163/0x280 [ 3321.876315][T16044] __should_failslab+0x121/0x190 [ 3321.881273][T16044] should_failslab+0x9/0x14 [ 3321.885806][T16044] kmem_cache_alloc+0x2b2/0x6f0 [ 3321.890679][T16044] ? find_mergeable_anon_vma+0x12c/0x2e0 [ 3321.896344][T16044] ? find_mergeable_anon_vma+0x260/0x2e0 [ 3321.902015][T16044] __anon_vma_prepare+0x1b1/0x3c0 [ 3321.907074][T16044] ? __pte_alloc+0x1ba/0x310 [ 3321.911701][T16044] __handle_mm_fault+0x34db/0x3ec0 [ 3321.916843][T16044] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3321.922411][T16044] ? find_held_lock+0x35/0x130 [ 3321.927200][T16044] ? handle_mm_fault+0x322/0xb30 [ 3321.932298][T16044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3321.938568][T16044] ? kasan_check_read+0x11/0x20 [ 3321.943436][T16044] handle_mm_fault+0x43f/0xb30 [ 3321.948243][T16044] __get_user_pages+0x7b6/0x1a40 [ 3321.953211][T16044] ? follow_page_mask+0x19a0/0x19a0 [ 3321.958449][T16044] get_user_pages_remote+0x21d/0x440 [ 3321.963779][T16044] copy_strings.isra.0+0x3dc/0x890 [ 3321.968923][T16044] ? remove_arg_zero+0x590/0x590 [ 3321.973877][T16044] ? prepare_binprm+0x6aa/0x940 [ 3321.978755][T16044] ? install_exec_creds+0x180/0x180 [ 3321.983989][T16044] copy_strings_kernel+0xa5/0x110 [ 3321.989043][T16044] __do_execve_file.isra.0+0x10ef/0x23a0 [ 3321.994714][T16044] ? copy_strings_kernel+0x110/0x110 18:59:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x89000000) 18:59:49 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018) [ 3322.000041][T16044] ? getname_flags+0x194/0x5b0 [ 3322.004826][T16044] ? getname_flags+0x3c4/0x5b0 [ 3322.009608][T16044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3322.015868][T16044] __ia32_compat_sys_execveat+0xf3/0x140 [ 3322.021533][T16044] do_fast_syscall_32+0x281/0xd54 [ 3322.026669][T16044] entry_SYSENTER_compat+0x70/0x7f [ 3322.031885][T16044] RIP: 0023:0xf7f8a849 18:59:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x89010000) [ 3322.035989][T16044] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3322.055634][T16044] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3322.064233][T16044] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3322.072232][T16044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3322.080225][T16044] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3322.088238][T16044] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3322.096230][T16044] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:49 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000040)=0x7) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8a000000) 18:59:49 executing program 3 (fault-call:2 fault-nth:22): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:49 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1027) 18:59:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000442, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3322.358851][T16307] FAULT_INJECTION: forcing a failure. [ 3322.358851][T16307] name failslab, interval 1, probability 0, space 0, times 0 [ 3322.376504][T16307] CPU: 0 PID: 16307 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3322.384077][T16307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3322.394145][T16307] Call Trace: [ 3322.397463][T16307] dump_stack+0x172/0x1f0 [ 3322.401825][T16307] should_fail.cold+0xa/0x15 [ 3322.406444][T16307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3322.412276][T16307] ? ___might_sleep+0x163/0x280 [ 3322.417152][T16307] __should_failslab+0x121/0x190 [ 3322.422108][T16307] should_failslab+0x9/0x14 [ 3322.426628][T16307] kmem_cache_alloc_trace+0x2d1/0x760 [ 3322.432020][T16307] ? mark_held_locks+0xf0/0xf0 [ 3322.436806][T16307] tomoyo_find_next_domain+0xe4/0x1f8a [ 3322.442291][T16307] ? perf_trace_lock+0x4c0/0x4c0 [ 3322.447251][T16307] ? retint_kernel+0x2b/0x2b [ 3322.451867][T16307] ? tomoyo_dump_page+0x510/0x510 [ 3322.456907][T16307] ? lock_acquire+0x16f/0x3f0 [ 3322.461600][T16307] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3322.467434][T16307] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3322.473168][T16307] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3322.478999][T16307] security_bprm_check+0x69/0xb0 [ 3322.483959][T16307] search_binary_handler+0x77/0x570 [ 3322.489176][T16307] ? kasan_check_read+0x11/0x20 [ 3322.494049][T16307] __do_execve_file.isra.0+0x1394/0x23a0 [ 3322.499705][T16307] ? copy_strings_kernel+0x110/0x110 [ 3322.504999][T16307] ? getname_flags+0x1a2/0x5b0 [ 3322.509779][T16307] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 3322.515336][T16307] __ia32_compat_sys_execveat+0xf3/0x140 [ 3322.520987][T16307] do_fast_syscall_32+0x281/0xd54 [ 3322.526022][T16307] entry_SYSENTER_compat+0x70/0x7f [ 3322.531134][T16307] RIP: 0023:0xf7f8a849 [ 3322.535203][T16307] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3322.554824][T16307] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3322.563248][T16307] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3322.571233][T16307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3322.579688][T16307] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3322.587664][T16307] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3322.595640][T16307] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000243, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8a010000) 18:59:49 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x8001, 0x42) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000240)={0x5ac9, 0x0, [], {0x0, @reserved}}) syz_open_procfs$namespace(r1, &(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\xf5') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x2) mq_getsetattr(r3, &(0x7f00000000c0)={0x0, 0x3fbb5964, 0x1, 0x989, 0x5, 0x4, 0xffffffffffffffc0, 0x7}, &(0x7f0000000100)) 18:59:49 executing program 3 (fault-call:2 fault-nth:23): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:49 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8b000000) 18:59:50 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) 18:59:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8b010000) 18:59:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3322.852312][T16593] FAULT_INJECTION: forcing a failure. [ 3322.852312][T16593] name failslab, interval 1, probability 0, space 0, times 0 [ 3322.917796][T16593] CPU: 1 PID: 16593 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3322.925406][T16593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3322.935497][T16593] Call Trace: [ 3322.938827][T16593] dump_stack+0x172/0x1f0 [ 3322.943197][T16593] should_fail.cold+0xa/0x15 [ 3322.947838][T16593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3322.953672][T16593] ? ___might_sleep+0x163/0x280 [ 3322.958552][T16593] __should_failslab+0x121/0x190 [ 3322.963522][T16593] should_failslab+0x9/0x14 [ 3322.968237][T16593] kmem_cache_alloc_trace+0x2d1/0x760 [ 3322.973630][T16593] ? retint_kernel+0x2b/0x2b [ 3322.978248][T16593] ? trace_hardirqs_on_caller+0x6a/0x220 [ 3322.983922][T16593] tomoyo_find_next_domain+0xe4/0x1f8a [ 3322.989406][T16593] ? retint_kernel+0x2b/0x2b [ 3322.994020][T16593] ? tomoyo_dump_page+0x510/0x510 [ 3322.999065][T16593] ? lock_acquire+0x1ea/0x3f0 [ 3323.003770][T16593] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3323.009508][T16593] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3323.015334][T16593] security_bprm_check+0x69/0xb0 [ 3323.020322][T16593] search_binary_handler+0x77/0x570 [ 3323.025572][T16593] ? kasan_check_read+0x11/0x20 [ 3323.030446][T16593] __do_execve_file.isra.0+0x1394/0x23a0 [ 3323.036118][T16593] ? copy_strings_kernel+0x110/0x110 [ 3323.041415][T16593] ? strncpy_from_user+0x2ac/0x380 [ 3323.046548][T16593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3323.052820][T16593] __ia32_compat_sys_execveat+0xf3/0x140 [ 3323.058490][T16593] do_fast_syscall_32+0x281/0xd54 [ 3323.063553][T16593] entry_SYSENTER_compat+0x70/0x7f [ 3323.068690][T16593] RIP: 0023:0xf7f8a849 [ 3323.072787][T16593] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3323.092409][T16593] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3323.100848][T16593] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3323.108863][T16593] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3323.116858][T16593] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3323.124846][T16593] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3323.132852][T16593] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8c000000) 18:59:50 executing program 3 (fault-call:2 fault-nth:24): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000445, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000244, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:50 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$setownex(r2, 0xf, &(0x7f00000000c0)={0x2, r1}) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8c010000) [ 3323.426722][T16804] FAULT_INJECTION: forcing a failure. [ 3323.426722][T16804] name failslab, interval 1, probability 0, space 0, times 0 [ 3323.482367][T16804] CPU: 1 PID: 16804 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3323.489973][T16804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3323.500053][T16804] Call Trace: [ 3323.503350][T16804] dump_stack+0x172/0x1f0 [ 3323.507714][T16804] should_fail.cold+0xa/0x15 [ 3323.512330][T16804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3323.518156][T16804] ? ___might_sleep+0x163/0x280 [ 3323.523035][T16804] __should_failslab+0x121/0x190 [ 3323.527992][T16804] should_failslab+0x9/0x14 [ 3323.532527][T16804] kmem_cache_alloc_trace+0x2d1/0x760 [ 3323.537930][T16804] tomoyo_find_next_domain+0x12c/0x1f8a [ 3323.543548][T16804] ? perf_trace_lock+0x4c0/0x4c0 [ 3323.548511][T16804] ? retint_kernel+0x2b/0x2b [ 3323.553125][T16804] ? tomoyo_dump_page+0x510/0x510 [ 3323.558172][T16804] ? lock_acquire+0x16f/0x3f0 [ 3323.562866][T16804] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3323.568711][T16804] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3323.574446][T16804] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3323.581088][T16804] security_bprm_check+0x69/0xb0 [ 3323.586050][T16804] search_binary_handler+0x77/0x570 [ 3323.591269][T16804] ? kasan_check_read+0x11/0x20 [ 3323.596233][T16804] __do_execve_file.isra.0+0x1394/0x23a0 [ 3323.601928][T16804] ? copy_strings_kernel+0x110/0x110 [ 3323.607233][T16804] ? strncpy_from_user+0x2ac/0x380 [ 3323.612368][T16804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3323.618634][T16804] __ia32_compat_sys_execveat+0xf3/0x140 [ 3323.624292][T16804] do_fast_syscall_32+0x281/0xd54 [ 3323.629360][T16804] entry_SYSENTER_compat+0x70/0x7f [ 3323.634489][T16804] RIP: 0023:0xf7f8a849 [ 3323.638575][T16804] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3323.658205][T16804] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3323.666637][T16804] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3323.674627][T16804] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 18:59:50 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) 18:59:50 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8d000000) [ 3323.682609][T16804] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3323.690596][T16804] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3323.698760][T16804] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000446, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:51 executing program 3 (fault-call:2 fault-nth:25): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:51 executing program 2: r0 = memfd_create(&(0x7f0000000200)='ns/mnt\x00', 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8d010000) 18:59:51 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) [ 3323.972827][T17144] FAULT_INJECTION: forcing a failure. [ 3323.972827][T17144] name failslab, interval 1, probability 0, space 0, times 0 [ 3324.010969][T17144] CPU: 1 PID: 17144 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3324.018582][T17144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3324.028657][T17144] Call Trace: [ 3324.031982][T17144] dump_stack+0x172/0x1f0 [ 3324.036343][T17144] should_fail.cold+0xa/0x15 [ 3324.040965][T17144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3324.046800][T17144] ? ___might_sleep+0x163/0x280 [ 3324.051671][T17144] __should_failslab+0x121/0x190 [ 3324.056634][T17144] should_failslab+0x9/0x14 [ 3324.061171][T17144] kmem_cache_alloc+0x2b2/0x6f0 [ 3324.066057][T17144] getname_kernel+0x53/0x370 18:59:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8e000000) [ 3324.070668][T17144] kern_path+0x20/0x40 [ 3324.074773][T17144] tomoyo_realpath_nofollow+0x74/0xdb [ 3324.080173][T17144] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3324.086013][T17144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3324.092266][T17144] ? tomoyo_init_request_info+0x105/0x1d0 [ 3324.098010][T17144] tomoyo_find_next_domain+0x28c/0x1f8a [ 3324.103587][T17144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3324.109073][T17144] ? tomoyo_dump_page+0x510/0x510 [ 3324.114125][T17144] ? lock_acquire+0x16f/0x3f0 [ 3324.118819][T17144] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3324.124648][T17144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3324.130163][T17144] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3324.135905][T17144] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3324.141742][T17144] security_bprm_check+0x69/0xb0 [ 3324.146711][T17144] search_binary_handler+0x77/0x570 [ 3324.151947][T17144] __do_execve_file.isra.0+0x1394/0x23a0 [ 3324.157618][T17144] ? copy_strings_kernel+0x110/0x110 [ 3324.162950][T17144] ? strncpy_from_user+0x2ac/0x380 18:59:51 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) [ 3324.168085][T17144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3324.174359][T17144] __ia32_compat_sys_execveat+0xf3/0x140 [ 3324.180023][T17144] do_fast_syscall_32+0x281/0xd54 [ 3324.185080][T17144] entry_SYSENTER_compat+0x70/0x7f [ 3324.190202][T17144] RIP: 0023:0xf7f8a849 [ 3324.194317][T17144] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3324.213969][T17144] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3324.222408][T17144] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3324.230527][T17144] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3324.238518][T17144] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3324.246508][T17144] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3324.254497][T17144] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000245, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8e010000) 18:59:51 executing program 3 (fault-call:2 fault-nth:26): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:51 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8f000000) 18:59:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000447, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3324.515166][T17405] FAULT_INJECTION: forcing a failure. [ 3324.515166][T17405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3324.528424][T17405] CPU: 0 PID: 17405 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3324.535977][T17405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3324.546054][T17405] Call Trace: [ 3324.549362][T17405] dump_stack+0x172/0x1f0 [ 3324.553711][T17405] should_fail.cold+0xa/0x15 [ 3324.558313][T17405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3324.564125][T17405] ? debug_smp_processor_id+0x3c/0x280 [ 3324.569619][T17405] ? perf_trace_lock+0xeb/0x4c0 [ 3324.574500][T17405] should_fail_alloc_page+0x50/0x60 [ 3324.580208][T17405] __alloc_pages_nodemask+0x1a1/0x8d0 [ 3324.585604][T17405] ? kmem_cache_alloc_trace+0x151/0x760 [ 3324.591498][T17405] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 3324.600452][T17405] ? find_held_lock+0x35/0x130 [ 3324.605235][T17405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3324.611055][T17405] cache_grow_begin+0x9c/0x860 [ 3324.615827][T17405] ? getname_kernel+0x53/0x370 [ 3324.620600][T17405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3324.626850][T17405] kmem_cache_alloc+0x62d/0x6f0 [ 3324.631747][T17405] getname_kernel+0x53/0x370 [ 3324.636369][T17405] kern_path+0x20/0x40 [ 3324.640457][T17405] tomoyo_realpath_nofollow+0x74/0xdb [ 3324.645847][T17405] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3324.651670][T17405] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3324.657928][T17405] ? tomoyo_init_request_info+0x105/0x1d0 [ 3324.663655][T17405] tomoyo_find_next_domain+0x28c/0x1f8a [ 3324.669227][T17405] ? retint_kernel+0x2b/0x2b [ 3324.673834][T17405] ? tomoyo_dump_page+0x510/0x510 [ 3324.678958][T17405] ? lock_acquire+0x16f/0x3f0 [ 3324.684236][T17405] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3324.690054][T17405] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3324.695781][T17405] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3324.701593][T17405] security_bprm_check+0x69/0xb0 [ 3324.706549][T17405] search_binary_handler+0x77/0x570 [ 3324.711757][T17405] ? kasan_check_read+0x11/0x20 [ 3324.716621][T17405] __do_execve_file.isra.0+0x1394/0x23a0 [ 3324.722286][T17405] ? copy_strings_kernel+0x110/0x110 [ 3324.727588][T17405] ? strncpy_from_user+0x2ac/0x380 [ 3324.733083][T17405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3324.739336][T17405] __ia32_compat_sys_execveat+0xf3/0x140 [ 3324.745000][T17405] do_fast_syscall_32+0x281/0xd54 [ 3324.750043][T17405] entry_SYSENTER_compat+0x70/0x7f [ 3324.755158][T17405] RIP: 0023:0xf7f8a849 [ 3324.759229][T17405] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3324.778930][T17405] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3324.787372][T17405] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3324.795351][T17405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3324.803329][T17405] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 18:59:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x8f010000) [ 3324.811299][T17405] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3324.819283][T17405] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:52 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c) 18:59:52 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x481, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x90000000) 18:59:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000448, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x90010000) 18:59:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x91000000) 18:59:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000246, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x91010000) 18:59:52 executing program 3 (fault-call:2 fault-nth:27): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000449, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:52 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074) 18:59:52 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x92000000) [ 3325.373808][T17749] FAULT_INJECTION: forcing a failure. [ 3325.373808][T17749] name failslab, interval 1, probability 0, space 0, times 0 18:59:52 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0xffffffe7) sync_file_range(r0, 0x5, 0x4, 0x5) r1 = gettid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x9) process_vm_readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/22, 0x16}], 0x1, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/186, 0xba}, {&(0x7f0000000100)=""/57, 0x39}, {&(0x7f0000000300)=""/142, 0x8e}], 0x4, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000400)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000480)={0x1, 0x40, @value=0x4}) [ 3325.456587][T17749] CPU: 1 PID: 17749 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3325.464192][T17749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3325.474270][T17749] Call Trace: [ 3325.477619][T17749] dump_stack+0x172/0x1f0 [ 3325.481983][T17749] should_fail.cold+0xa/0x15 [ 3325.486602][T17749] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3325.492432][T17749] ? __task_pid_nr_ns+0x1b1/0x530 [ 3325.497497][T17749] __should_failslab+0x121/0x190 [ 3325.502460][T17749] should_failslab+0x9/0x14 [ 3325.506995][T17749] kmem_cache_alloc_trace+0x4b/0x760 [ 3325.512296][T17749] ? kasan_check_read+0x11/0x20 [ 3325.517237][T17749] proc_self_get_link+0x16f/0x1d0 [ 3325.522283][T17749] ? proc_ns_dir_readdir+0x570/0x570 [ 3325.527591][T17749] link_path_walk.part.0+0xee0/0x1350 [ 3325.532989][T17749] ? walk_component+0x2000/0x2000 [ 3325.538036][T17749] ? save_stack+0x5c/0x90 [ 3325.542380][T17749] ? save_stack+0x23/0x90 [ 3325.546733][T17749] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3325.552655][T17749] ? path_mountpoint+0x1e60/0x1e60 [ 3325.557792][T17749] path_lookupat.isra.0+0xe3/0x8d0 [ 3325.562925][T17749] ? do_fast_syscall_32+0x281/0xd54 [ 3325.568154][T17749] ? path_parentat.isra.0+0x160/0x160 [ 3325.573550][T17749] ? mark_held_locks+0xa4/0xf0 [ 3325.579388][T17749] ? mark_held_locks+0xa4/0xf0 [ 3325.584168][T17749] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3325.589649][T17749] filename_lookup+0x1b0/0x410 [ 3325.594442][T17749] ? nd_jump_link+0x1d0/0x1d0 [ 3325.599182][T17749] ? __memcpy+0x20/0x20 [ 3325.603530][T17749] ? memcpy+0x46/0x50 [ 3325.607534][T17749] ? getname_kernel+0x223/0x370 [ 3325.612406][T17749] kern_path+0x36/0x40 [ 3325.616507][T17749] tomoyo_realpath_nofollow+0x74/0xdb [ 3325.621902][T17749] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3325.627734][T17749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3325.633991][T17749] ? tomoyo_init_request_info+0x105/0x1d0 [ 3325.639763][T17749] tomoyo_find_next_domain+0x28c/0x1f8a [ 3325.645335][T17749] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3325.650830][T17749] ? tomoyo_dump_page+0x510/0x510 [ 3325.655882][T17749] ? lock_acquire+0x16f/0x3f0 [ 3325.660582][T17749] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3325.666416][T17749] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3325.672333][T17749] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3325.678525][T17749] security_bprm_check+0x69/0xb0 [ 3325.683992][T17749] search_binary_handler+0x77/0x570 [ 3325.689209][T17749] ? kasan_check_read+0x11/0x20 [ 3325.694175][T17749] __do_execve_file.isra.0+0x1394/0x23a0 [ 3325.699846][T17749] ? copy_strings_kernel+0x110/0x110 [ 3325.705147][T17749] ? getname_flags+0x40a/0x5b0 [ 3325.709951][T17749] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 3325.715699][T17749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3325.722167][T17749] __ia32_compat_sys_execveat+0xf3/0x140 [ 3325.727836][T17749] do_fast_syscall_32+0x281/0xd54 [ 3325.733001][T17749] entry_SYSENTER_compat+0x70/0x7f [ 3325.738145][T17749] RIP: 0023:0xf7f8a849 [ 3325.742926][T17749] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3325.762635][T17749] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3325.771175][T17749] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3325.779171][T17749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3325.787258][T17749] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3325.795250][T17749] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 18:59:53 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a) 18:59:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x92010000) [ 3325.803263][T17749] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000044a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x93000000) 18:59:53 executing program 3 (fault-call:2 fault-nth:28): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 18:59:53 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x10fe) [ 3326.211846][T18173] FAULT_INJECTION: forcing a failure. [ 3326.211846][T18173] name failslab, interval 1, probability 0, space 0, times 0 [ 3326.235859][T18173] CPU: 1 PID: 18173 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3326.243446][T18173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3326.253545][T18173] Call Trace: [ 3326.256866][T18173] dump_stack+0x172/0x1f0 [ 3326.261230][T18173] should_fail.cold+0xa/0x15 [ 3326.265841][T18173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3326.271667][T18173] ? ___might_sleep+0x163/0x280 [ 3326.276559][T18173] __should_failslab+0x121/0x190 [ 3326.281558][T18173] should_failslab+0x9/0x14 [ 3326.286080][T18173] kmem_cache_alloc+0x2b2/0x6f0 [ 3326.290953][T18173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3326.297299][T18173] ? debug_smp_processor_id+0x3c/0x280 [ 3326.302809][T18173] __d_alloc+0x2e/0x8c0 [ 3326.306986][T18173] d_alloc+0x4d/0x280 [ 3326.310993][T18173] d_alloc_parallel+0xf4/0x1bc0 [ 3326.316049][T18173] ? perf_trace_lock+0xeb/0x4c0 [ 3326.320938][T18173] ? __d_lookup_rcu+0x6c0/0x6c0 [ 3326.325808][T18173] ? trace_hardirqs_on_caller+0x6a/0x220 [ 3326.331459][T18173] ? find_held_lock+0x35/0x130 [ 3326.336257][T18173] ? lockdep_init_map+0x1be/0x6d0 [ 3326.341299][T18173] ? lockdep_init_map+0x1be/0x6d0 [ 3326.346350][T18173] __lookup_slow+0x1ab/0x500 [ 3326.350968][T18173] ? vfs_unlink+0x560/0x560 [ 3326.355525][T18173] ? kasan_check_write+0x14/0x20 [ 3326.360495][T18173] lookup_slow+0x58/0x80 [ 3326.364757][T18173] walk_component+0x74b/0x2000 [ 3326.369544][T18173] ? path_init+0x18f0/0x18f0 [ 3326.374152][T18173] ? inode_permission+0xaa/0x570 [ 3326.379108][T18173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3326.385360][T18173] ? security_inode_permission+0xd5/0x110 [ 3326.391103][T18173] ? inode_permission+0xb4/0x570 [ 3326.396062][T18173] link_path_walk.part.0+0x5ab/0x1350 [ 3326.401463][T18173] ? walk_component+0x2000/0x2000 [ 3326.406516][T18173] ? save_stack+0x5c/0x90 [ 3326.410880][T18173] ? save_stack+0x23/0x90 [ 3326.415223][T18173] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3326.421048][T18173] ? path_mountpoint+0x1e60/0x1e60 [ 3326.426182][T18173] path_lookupat.isra.0+0xe3/0x8d0 [ 3326.431308][T18173] ? do_fast_syscall_32+0x281/0xd54 [ 3326.436521][T18173] ? path_parentat.isra.0+0x160/0x160 [ 3326.441903][T18173] ? retint_kernel+0x2b/0x2b [ 3326.446514][T18173] ? trace_hardirqs_on_caller+0x6a/0x220 [ 3326.452170][T18173] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3326.457651][T18173] filename_lookup+0x1b0/0x410 [ 3326.462442][T18173] ? nd_jump_link+0x1d0/0x1d0 [ 3326.467214][T18173] ? simple_attr_release+0x50/0x50 [ 3326.472357][T18173] ? memcpy+0x46/0x50 [ 3326.476356][T18173] ? getname_kernel+0x223/0x370 [ 3326.481256][T18173] kern_path+0x36/0x40 [ 3326.485347][T18173] tomoyo_realpath_nofollow+0x74/0xdb [ 3326.490744][T18173] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3326.496575][T18173] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3326.502838][T18173] ? tomoyo_init_request_info+0x105/0x1d0 [ 3326.508606][T18173] tomoyo_find_next_domain+0x28c/0x1f8a [ 3326.514181][T18173] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3326.519670][T18173] ? tomoyo_dump_page+0x510/0x510 [ 3326.524735][T18173] ? lock_acquire+0x16f/0x3f0 [ 3326.529431][T18173] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3326.535398][T18173] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3326.541126][T18173] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3326.547081][T18173] security_bprm_check+0x69/0xb0 [ 3326.552153][T18173] search_binary_handler+0x77/0x570 [ 3326.557364][T18173] ? kasan_check_read+0x11/0x20 [ 3326.562360][T18173] __do_execve_file.isra.0+0x1394/0x23a0 [ 3326.568305][T18173] ? copy_strings_kernel+0x110/0x110 [ 3326.573856][T18173] ? strncpy_from_user+0x2ac/0x380 [ 3326.578987][T18173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3326.585249][T18173] __ia32_compat_sys_execveat+0xf3/0x140 [ 3326.591070][T18173] do_fast_syscall_32+0x281/0xd54 [ 3326.596119][T18173] entry_SYSENTER_compat+0x70/0x7f [ 3326.601240][T18173] RIP: 0023:0xf7f8a849 [ 3326.605417][T18173] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3326.625414][T18173] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3326.633846][T18173] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3326.642579][T18173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3326.650984][T18173] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 18:59:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x93010000) 18:59:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x94000000) 18:59:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x94010000) 18:59:53 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x95000000) [ 3326.659156][T18173] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3326.667143][T18173] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:54 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4a992457, 0x80) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x95010000) 18:59:54 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 18:59:54 executing program 3 (fault-call:2 fault-nth:29): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000044b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000248, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 3326.942184][T18440] FAULT_INJECTION: forcing a failure. [ 3326.942184][T18440] name failslab, interval 1, probability 0, space 0, times 0 [ 3326.975534][T18440] CPU: 0 PID: 18440 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3326.983133][T18440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3326.993204][T18440] Call Trace: [ 3326.996528][T18440] dump_stack+0x172/0x1f0 [ 3327.000898][T18440] should_fail.cold+0xa/0x15 [ 3327.005521][T18440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3327.011358][T18440] ? ___might_sleep+0x163/0x280 [ 3327.016235][T18440] __should_failslab+0x121/0x190 [ 3327.021189][T18440] should_failslab+0x9/0x14 [ 3327.025715][T18440] kmem_cache_alloc+0x2b2/0x6f0 [ 3327.030596][T18440] ? kernel_text_address+0x73/0xf0 [ 3327.035733][T18440] ? __kernel_text_address+0xd/0x40 [ 3327.040946][T18440] __d_alloc+0x2e/0x8c0 [ 3327.045129][T18440] d_alloc+0x4d/0x280 [ 3327.049165][T18440] d_alloc_parallel+0xf4/0x1bc0 [ 3327.054033][T18440] ? perf_trace_lock+0xeb/0x4c0 [ 3327.058918][T18440] ? __d_lookup_rcu+0x6c0/0x6c0 [ 3327.063780][T18440] ? mark_held_locks+0xa4/0xf0 [ 3327.068566][T18440] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3327.074083][T18440] ? lockdep_init_map+0x1be/0x6d0 [ 3327.079136][T18440] ? lockdep_init_map+0x1be/0x6d0 [ 3327.084189][T18440] __lookup_slow+0x1ab/0x500 [ 3327.088803][T18440] ? vfs_unlink+0x560/0x560 [ 3327.093432][T18440] ? kasan_check_write+0x14/0x20 [ 3327.098390][T18440] lookup_slow+0x58/0x80 [ 3327.102648][T18440] walk_component+0x74b/0x2000 [ 3327.107429][T18440] ? retint_kernel+0x2b/0x2b [ 3327.112038][T18440] ? path_init+0x18f0/0x18f0 [ 3327.116649][T18440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3327.122910][T18440] ? security_inode_permission+0xd5/0x110 [ 3327.128646][T18440] ? inode_permission+0xb4/0x570 [ 3327.133602][T18440] link_path_walk.part.0+0x5ab/0x1350 [ 3327.139002][T18440] ? walk_component+0x2000/0x2000 [ 3327.144053][T18440] ? path_lookupat.isra.0+0x21b/0x8d0 [ 3327.149463][T18440] path_lookupat.isra.0+0xe3/0x8d0 [ 3327.154614][T18440] ? path_parentat.isra.0+0x160/0x160 [ 3327.160004][T18440] ? retint_kernel+0x2b/0x2b [ 3327.164630][T18440] filename_lookup+0x1b0/0x410 [ 3327.169408][T18440] ? nd_jump_link+0x1d0/0x1d0 [ 3327.174121][T18440] ? simple_attr_release+0x50/0x50 [ 3327.179280][T18440] ? retint_kernel+0x2b/0x2b [ 3327.183881][T18440] ? memcpy+0x46/0x50 [ 3327.187883][T18440] ? getname_kernel+0x223/0x370 [ 3327.192775][T18440] kern_path+0x36/0x40 [ 3327.196882][T18440] tomoyo_realpath_nofollow+0x74/0xdb [ 3327.202277][T18440] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3327.208099][T18440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3327.214352][T18440] ? tomoyo_init_request_info+0x105/0x1d0 [ 3327.220088][T18440] tomoyo_find_next_domain+0x28c/0x1f8a [ 3327.225682][T18440] ? retint_kernel+0x2b/0x2b [ 3327.230310][T18440] ? tomoyo_dump_page+0x510/0x510 [ 3327.235346][T18440] ? lock_acquire+0x16f/0x3f0 [ 3327.240030][T18440] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3327.245851][T18440] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3327.251579][T18440] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3327.257393][T18440] security_bprm_check+0x69/0xb0 [ 3327.262340][T18440] search_binary_handler+0x77/0x570 [ 3327.267552][T18440] ? kasan_check_read+0x11/0x20 [ 3327.272421][T18440] __do_execve_file.isra.0+0x1394/0x23a0 [ 3327.278081][T18440] ? copy_strings_kernel+0x110/0x110 [ 3327.283374][T18440] ? strncpy_from_user+0x2ac/0x380 [ 3327.288494][T18440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3327.294761][T18440] __ia32_compat_sys_execveat+0xf3/0x140 [ 3327.300451][T18440] do_fast_syscall_32+0x281/0xd54 [ 3327.305493][T18440] entry_SYSENTER_compat+0x70/0x7f [ 3327.310615][T18440] RIP: 0023:0xf7f8a849 [ 3327.314695][T18440] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3327.334321][T18440] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 18:59:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x96000000) [ 3327.342756][T18440] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3327.350766][T18440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3327.358770][T18440] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3327.366761][T18440] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3327.374767][T18440] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:54 executing program 3 (fault-call:2 fault-nth:30): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x96010000) 18:59:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000044c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:59:54 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x97000000) 18:59:54 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200) [ 3327.648306][T18620] FAULT_INJECTION: forcing a failure. [ 3327.648306][T18620] name failslab, interval 1, probability 0, space 0, times 0 [ 3327.703217][T18620] CPU: 1 PID: 18620 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3327.710819][T18620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3327.720905][T18620] Call Trace: [ 3327.724229][T18620] dump_stack+0x172/0x1f0 [ 3327.728600][T18620] should_fail.cold+0xa/0x15 [ 3327.733223][T18620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3327.739075][T18620] __should_failslab+0x121/0x190 [ 3327.744064][T18620] should_failslab+0x9/0x14 [ 3327.748598][T18620] kmem_cache_alloc+0x2b2/0x6f0 [ 3327.753477][T18620] ? retint_kernel+0x2b/0x2b [ 3327.758112][T18620] __d_alloc+0x2e/0x8c0 [ 3327.762294][T18620] ? d_alloc+0x1c/0x280 [ 3327.766482][T18620] d_alloc+0x4d/0x280 [ 3327.770502][T18620] d_alloc_parallel+0xf4/0x1bc0 [ 3327.775373][T18620] ? is_dynamic_key+0x1c0/0x1c0 [ 3327.780245][T18620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3327.785739][T18620] ? __d_lookup_rcu+0x6c0/0x6c0 [ 3327.790611][T18620] ? mark_held_locks+0xa4/0xf0 [ 3327.795395][T18620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3327.800884][T18620] ? lockdep_init_map+0x1be/0x6d0 [ 3327.805940][T18620] ? lockdep_init_map+0x1be/0x6d0 [ 3327.810993][T18620] __lookup_slow+0x1ab/0x500 [ 3327.815631][T18620] ? vfs_unlink+0x560/0x560 [ 3327.820210][T18620] ? kasan_check_write+0x14/0x20 [ 3327.825183][T18620] lookup_slow+0x58/0x80 [ 3327.829464][T18620] walk_component+0x74b/0x2000 [ 3327.834258][T18620] ? inode_permission+0xb4/0x570 [ 3327.839232][T18620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3327.845490][T18620] ? path_init+0x18f0/0x18f0 [ 3327.850093][T18620] ? walk_component+0x2000/0x2000 [ 3327.855118][T18620] ? save_stack+0x5c/0x90 [ 3327.859479][T18620] ? save_stack+0x23/0x90 [ 3327.863836][T18620] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 3327.869667][T18620] ? path_mountpoint+0x1e60/0x1e60 [ 3327.874812][T18620] path_lookupat.isra.0+0x1f5/0x8d0 [ 3327.880039][T18620] ? do_fast_syscall_32+0x281/0xd54 [ 3327.885265][T18620] ? path_parentat.isra.0+0x160/0x160 [ 3327.890669][T18620] ? cache_grow_end+0xa4/0x190 [ 3327.895461][T18620] ? find_held_lock+0x35/0x130 [ 3327.900259][T18620] ? cache_grow_end+0xa4/0x190 [ 3327.905049][T18620] filename_lookup+0x1b0/0x410 [ 3327.909851][T18620] ? nd_jump_link+0x1d0/0x1d0 [ 3327.914590][T18620] ? simple_attr_release+0x50/0x50 [ 3327.919754][T18620] ? memcpy+0x46/0x50 [ 3327.923759][T18620] ? getname_kernel+0x223/0x370 [ 3327.928656][T18620] kern_path+0x36/0x40 [ 3327.932761][T18620] tomoyo_realpath_nofollow+0x74/0xdb [ 3327.938164][T18620] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3327.943997][T18620] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3327.950256][T18620] ? tomoyo_init_request_info+0x105/0x1d0 [ 3327.956006][T18620] tomoyo_find_next_domain+0x28c/0x1f8a [ 3327.961601][T18620] ? tomoyo_dump_page+0x510/0x510 [ 3327.966657][T18620] ? lock_acquire+0x16f/0x3f0 [ 3327.971369][T18620] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3327.977207][T18620] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3327.982949][T18620] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3327.988777][T18620] security_bprm_check+0x69/0xb0 [ 3327.993744][T18620] search_binary_handler+0x77/0x570 [ 3327.998954][T18620] ? kasan_check_read+0x11/0x20 [ 3328.003839][T18620] __do_execve_file.isra.0+0x1394/0x23a0 [ 3328.009512][T18620] ? copy_strings_kernel+0x110/0x110 [ 3328.014802][T18620] __ia32_compat_sys_execveat+0xf3/0x140 [ 3328.020450][T18620] do_fast_syscall_32+0x281/0xd54 [ 3328.025506][T18620] entry_SYSENTER_compat+0x70/0x7f [ 3328.030623][T18620] RIP: 0023:0xf7f8a849 [ 3328.034700][T18620] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 18:59:55 executing program 2: memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={r3, @in={{0x2, 0x4e22, @multicast1}}, [0xa6, 0x8, 0x27, 0x9, 0x81, 0xe4, 0x87, 0x8000, 0x6, 0x4, 0x155, 0x1000, 0x4, 0xffffffffffff3cac, 0x39]}, &(0x7f0000000300)=0x100) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20400, 0x0) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f00000000c0)) wait4(r0, &(0x7f0000000100), 0x1, &(0x7f0000000400)) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000480)=0xc0, 0x4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000380)=0x2) chdir(&(0x7f00000004c0)='./file0\x00') ioctl$VIDIOC_DQBUF(r4, 0xc0445611, &(0x7f0000000340)={0x1ff, 0x9, 0x4, 0x40808, {0x77359400}, {0x4, 0xa, 0x6, 0x4, 0x7, 0x8, "daaa4d7d"}, 0xcd, 0x4, @fd=r2, 0x4}) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) 18:59:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x97010000) 18:59:55 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00) 18:59:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000249, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 3328.054338][T18620] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3328.062783][T18620] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3328.070767][T18620] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3328.078746][T18620] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3328.086733][T18620] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3328.094713][T18620] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:59:55 executing program 3 (fault-call:2 fault-nth:31): r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:59:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x98000000) 18:59:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80000000000044d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3328.358612][T18922] FAULT_INJECTION: forcing a failure. [ 3328.358612][T18922] name failslab, interval 1, probability 0, space 0, times 0 [ 3328.406869][T18922] CPU: 0 PID: 18922 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3328.414491][T18922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3328.424608][T18922] Call Trace: [ 3328.427933][T18922] dump_stack+0x172/0x1f0 [ 3328.432400][T18922] should_fail.cold+0xa/0x15 [ 3328.437203][T18922] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3328.443051][T18922] ? ___might_sleep+0x163/0x280 [ 3328.447939][T18922] __should_failslab+0x121/0x190 [ 3328.452916][T18922] should_failslab+0x9/0x14 [ 3328.457444][T18922] __kmalloc+0x2dc/0x740 [ 3328.461715][T18922] ? retint_kernel+0x2b/0x2b [ 3328.466330][T18922] ? tomoyo_encode2.part.0+0xf5/0x400 [ 3328.471727][T18922] tomoyo_encode2.part.0+0xf5/0x400 [ 3328.476957][T18922] tomoyo_encode+0x2b/0x50 [ 3328.481401][T18922] tomoyo_realpath_from_path+0x1d5/0x7a0 [ 3328.487067][T18922] tomoyo_realpath_nofollow+0xc8/0xdb [ 3328.492468][T18922] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3328.498300][T18922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3328.504581][T18922] ? tomoyo_init_request_info+0x105/0x1d0 [ 3328.510342][T18922] tomoyo_find_next_domain+0x28c/0x1f8a [ 3328.515929][T18922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3328.529421][T18922] ? tomoyo_dump_page+0x510/0x510 [ 3328.534480][T18922] ? lock_acquire+0x16f/0x3f0 [ 3328.539187][T18922] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3328.545037][T18922] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3328.550785][T18922] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3328.556624][T18922] ? security_bprm_check+0x64/0xb0 [ 3328.561764][T18922] security_bprm_check+0x69/0xb0 [ 3328.566728][T18922] search_binary_handler+0x77/0x570 [ 3328.572032][T18922] ? kasan_check_read+0x11/0x20 [ 3328.577349][T18922] __do_execve_file.isra.0+0x1394/0x23a0 [ 3328.583008][T18922] ? copy_strings_kernel+0x110/0x110 [ 3328.588301][T18922] ? strncpy_from_user+0x2ac/0x380 [ 3328.593442][T18922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3328.599697][T18922] __ia32_compat_sys_execveat+0xf3/0x140 [ 3328.605345][T18922] do_fast_syscall_32+0x281/0xd54 [ 3328.610383][T18922] entry_SYSENTER_compat+0x70/0x7f [ 3328.615501][T18922] RIP: 0023:0xf7f8a849 [ 3328.619573][T18922] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3328.639186][T18922] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3328.647611][T18922] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 18:59:55 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x98010000) [ 3328.655593][T18922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3328.663573][T18922] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3328.671553][T18922] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3328.679532][T18922] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3328.694961][T18922] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3328.710596][T18922] Kernel panic - not syncing: MAC Initialization failed. [ 3328.717744][T18922] CPU: 1 PID: 18922 Comm: syz-executor.3 Not tainted 5.1.0+ #9 [ 3328.725295][T18922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3328.735362][T18922] Call Trace: [ 3328.739392][T18922] dump_stack+0x172/0x1f0 [ 3328.743757][T18922] panic+0x2cb/0x65c [ 3328.747669][T18922] ? __warn_printk+0xf3/0xf3 [ 3328.752491][T18922] ? tomoyo_warn_oom.cold+0x24/0x43 [ 3328.757808][T18922] tomoyo_warn_oom.cold+0x35/0x43 [ 3328.762855][T18922] tomoyo_realpath_from_path+0x40e/0x7a0 [ 3328.768531][T18922] tomoyo_realpath_nofollow+0xc8/0xdb [ 3328.773924][T18922] ? tomoyo_realpath_from_path+0x7a0/0x7a0 [ 3328.779759][T18922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3328.786009][T18922] ? tomoyo_init_request_info+0x105/0x1d0 [ 3328.791744][T18922] tomoyo_find_next_domain+0x28c/0x1f8a [ 3328.797498][T18922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3328.802987][T18922] ? tomoyo_dump_page+0x510/0x510 [ 3328.808034][T18922] ? lock_acquire+0x16f/0x3f0 [ 3328.812734][T18922] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3328.818563][T18922] tomoyo_bprm_check_security+0x12a/0x1b0 [ 3328.824382][T18922] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 3328.830204][T18922] ? security_bprm_check+0x64/0xb0 [ 3328.837071][T18922] security_bprm_check+0x69/0xb0 [ 3328.842035][T18922] search_binary_handler+0x77/0x570 [ 3328.847249][T18922] ? kasan_check_read+0x11/0x20 [ 3328.852216][T18922] __do_execve_file.isra.0+0x1394/0x23a0 18:59:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x99000000) 18:59:56 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 3328.857881][T18922] ? copy_strings_kernel+0x110/0x110 [ 3328.863182][T18922] ? strncpy_from_user+0x2ac/0x380 [ 3328.868318][T18922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3328.874587][T18922] __ia32_compat_sys_execveat+0xf3/0x140 [ 3328.880273][T18922] do_fast_syscall_32+0x281/0xd54 [ 3328.885346][T18922] entry_SYSENTER_compat+0x70/0x7f [ 3328.890478][T18922] RIP: 0023:0xf7f8a849 18:59:56 executing program 1: getrandom(&(0x7f0000000240)=""/4096, 0x1000, 0x99010000) [ 3328.894683][T18922] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3328.914574][T18922] RSP: 002b:00000000f5d860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 3328.923016][T18922] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3328.931018][T18922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 3328.939014][T18922] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3328.947123][T18922] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3328.955114][T18922] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3328.964794][T18922] Kernel Offset: disabled [ 3328.969156][T18922] Rebooting in 86400 seconds..