4a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40047703, 0xffffffbffffffffe) 19:13:01 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x20000000008050, r0, 0x0) r2 = pkey_alloc(0x0, 0x3) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000100)=0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) pkey_free(r2) 19:13:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x89f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:01 executing program 1: lookup_dcookie(0xfffffffffffffffb, &(0x7f0000000000)=""/94, 0x5e) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) [ 2256.456092] IPVS: ftp: loaded support on port[0] = 21 19:13:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a0, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:01 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) 19:13:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a1, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) accept4$packet(r0, &(0x7f0000000100), &(0x7f0000000380)=0x14, 0x80800) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:03 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x2, 0xe123, 0x3c9, 0x0, 0x0, [{r0, 0x0, 0x3d34ad90}, {r0, 0x0, 0x9}, {r0, 0x0, 0x3eca}, {r0}, {r0, 0x0, 0x9}]}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x7, 0x402003) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000002c0)={0x5, &(0x7f0000000280)=[{0x9, 0x2, 0x80000000, 0x3}, {0xfffffffffffffac7, 0x4, 0x90, 0x17}, {0x80000001, 0x3, 0xbc, 0x5}, {0x200, 0x2, 0x10001, 0x101}, {0x9, 0x6, 0x0, 0xfffffffffffffffb}]}, 0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x40200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffffffffa59da990, @loopback, 0x2}, {0xa, 0x4e20, 0xe943, @empty, 0x9}, r3, 0x20a}}, 0x48) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:03 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a2, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40047703, 0xffffffbffffffffe) 19:13:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:04 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x90901, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f00000000c0)) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r1, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r1, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80000000, 0x0) 19:13:04 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a3, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) [ 2259.017844] IPVS: ftp: loaded support on port[0] = 21 19:13:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:04 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x109a00) ioctl$ASHMEM_SET_SIZE(r1, 0x40047703, 0x802) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f00000000c0)={0xffffffffffffff81, "031c92e4b510004a183d1be54c4ba80071cad8580f5885a56de89e08164fa55e", 0x4c1, 0x101, 0xfd, 0x10}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf761806f34bd8676b53570e89e56e80"], 0x0, 0x6}, 0x48) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a4, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) socketpair(0x10, 0x807, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e22, @broadcast}, 0x26, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0xdcf, 0x22}) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r2, 0x1, 0x6, @local}, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x8001, 0xfffffffffffffffc, 0x1, 0xffffffffffffff63}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a5, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x381002, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a6, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2261.692517] IPVS: ftp: loaded support on port[0] = 21 19:13:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:13:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:09 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x8000) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc7a70c8044c232cc}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x6, 0xf, 0x200, 0x70bd27, 0x25dfdbfb, {0x2, 0x0, 0x9}, [@generic="15a4"]}, 0x18}, 0x1, 0x0, 0x0, 0x8004}, 0x800) 19:13:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a7, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:09 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) fcntl$notify(r0, 0x402, 0x20) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xb43d929f4c232804, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) 19:13:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a8, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8a9, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) [ 2264.205526] IPVS: ftp: loaded support on port[0] = 21 19:13:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000085294f19f6720500000000000000cf7618060000f3ecbd41d8a7676b53570e89"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:11 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x200000004) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8aa, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x402001, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) sendmsg$alg(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000480)="fae9a679a026126bdc7b5ec0ed3324135020008909f00762baf11601d50a291030f5e67bed62587d50d2894ce299b675265d142ab67a5fd6fc478d04c80cc53750e62c183e52ffc667865df3fbc099fbe0b3380999eca146941dc7ce4a593a8a126dd1a4c3030dcb62c80b69532b2ac1167d211279307dee4353b0c89e005ad3ce690016aa", 0x85}, {&(0x7f0000000540)="abafe1e4cd644686941892c302c4f7596f124f0a591af47edfc01c1f32580948960e18b3aacb631a8c5010601562099bc7cd968f901972b0752b7d34f1cc8808788b0cfd9b9309b92df8790b94c14aae997727e55d905f27e6f4fa4329b4e9611088dcf1a90780315cd926bc3effe0c1c05486487620b1b5237823276b36910562477a2466b2a8dfd9a04e3caa0c4fc6aefc7ee2ccf4d84dd3f5926daa54ec67102a6c0de246cb4aed825ea972fc221798b993abb8da0401ca28c717a43ae1f7101bf70783940c6f2782833598c57a6a23dd5a54fc2ac56e526a4b5e38a3973ad8", 0xe1}, {&(0x7f0000000640)="5a5273e0cb2fe77f7dc53a283bd1cbd75c74a797a99d8036b6397130f7a26b334af3536d08bc0c9c3f716dd6acfeca09bc3f46d5b1338192f6a62f48c10e8ffcd532531aa42169482046d0a00c4b9786011b32a06e9ba10458c8454fed8bddce9798a08d3d1faa3956944747e42cd1518ed1405fdb765305243bd94679b632542d45585f493074a5a81cb81dbba1a41e18837d70ecc31ac3cd4d23b2c83b8e85c931b50f0ac7d236b9fbdac5856664fca5b741291e9f06454eda20bdb3e8ca356b5c60a6016527488636950a1e40a8e583338e593b6223bacbb18ac3b76f490d82e6519f97e9b715de27", 0xea}], 0x3, &(0x7f0000000780), 0x0, 0x4}, 0x4000010) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r1, 0x40047703, 0xffffffbffffffffe) signalfd4(r1, &(0x7f0000000040)={0x5}, 0xffffffffffffff1e, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xffffffffffffffc0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) 19:13:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ab, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03'}, 0x58) 19:13:12 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fchmod(r1, 0x22) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x3, 0xb08, 0x10001, {0x0, 0x7530}, {r3, r4/1000+30000}, {0x4, 0x1000, 0x0, 0x9}, 0x1, @canfd={{0x3, 0x0, 0x5, 0x7}, 0x1d, 0x2, 0x0, 0x0, "2f26d6e8ea7f5fcb1f9e3be22a3b88fcc402420453509264ff8fae716e2297ab9b079988ba35dacd28c5ca84469bfca951fd6f97a593fa3252ed0364eb33611f"}}, 0x6c}}, 0x0) [ 2267.000314] IPVS: ftp: loaded support on port[0] = 21 19:13:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) [ 2267.590870] IPVS: ftp: loaded support on port[0] = 21 19:13:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x100000001, 0x4, 0x0, 0x0, r0}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0xa, 0x8000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:13:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05'}, 0x58) 19:13:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ac, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:12 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xfffffffffffffffd, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r1 = dup(r0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)={[{0xe0, 0x2, 0xb63d, 0x20, 0x80000001, 0x400000000, 0xff, 0x1, 0x1, 0x8, 0x7, 0xc9e, 0x100000000}, {0xfffffffffffffffc, 0x8, 0x2, 0xfffffffffffffffa, 0x800, 0x8, 0x4, 0x8000, 0x1f, 0xe479, 0x7f, 0x1b, 0x9}, {0x4, 0x1, 0x8001, 0x78f, 0xa6, 0x7, 0xe42, 0x4, 0x40, 0xfa, 0x1f, 0x4, 0x5}], 0x6}) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0xc, &(0x7f0000000100)='/dev/ashmem\x00', 0xffffffffffffffff}, 0x30) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10000) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000180)={r1, r1, 0x5}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:13 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ad, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06'}, 0x58) 19:13:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc044565d, &(0x7f00000001c0)={0x1, 0xd, 0x4, 0x1, {r2, r3/1000+30000}, {0x5, 0xc, 0x90000000000000, 0x10000, 0x100, 0x92, "3be986cf"}, 0x100000001, 0x1, @planes=&(0x7f0000000180)={0x3, 0x5, @mem_offset=0x7, 0x1f}, 0x4}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile64(r0, r0, &(0x7f0000000200)=0x3, 0x3) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0x18, 0x0, 0x5, {0x80000001}}, 0x18) ioctl$ASHMEM_SET_SIZE(r1, 0x40047703, 0xffffffbfffbffffe) ioctl$TIOCSTI(r1, 0x5412, 0xfffffffffffff1da) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:13 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ae, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000001000)=ANY=[@ANYBLOB="1000000000000500000000000005536b53574833e56ee16a24a3499bf569328c364f6bc135259498fc6009aa035c075064f2c7f40036b98fefc06e3845f7efc3fda1a0908a049482b087d7e0f0a5f890b21f09b7c62cec84557a5e743937166368c235b94d245f1198740286a0bf68f7bc2dfc05c067a71a7c7597aba4a5e716cc0da6071c2f71461537bb781d26a4ac6ad5ba0227c914c62a69bca97016dc62c654d8db314a4e034d0efee1d7c25f746a7a2e657393556bf9f4f065d4d3ad5dc959cf018110d2fc435bf3de164b77e0b24fe5e6880de3142861538ea993a69171d2034fefd1f6298b146e4a10cc3f614c592e2c9a08991d044ec54aa2325d7fded8d1"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) socket$rxrpc(0x21, 0x2, 0xa) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, 0x0) sendmsg$rds(r0, &(0x7f0000000580)={&(0x7f0000000100)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000380)=""/102, 0x66}, {&(0x7f00000004c0)=""/24, 0x18}], 0x2, 0x0, 0x0, 0x40000}, 0x20000000) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='wlan0\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000005c0)={r0, 0x63, 0x5, r0}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000001140)) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000080)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:13:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, 0x58) 19:13:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:14 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) r1 = getpgid(0x0) ptrace(0x10, r1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400042, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x401, 0x127, 0x5, r1}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) ptrace$poke(0xffffffffffffffff, r1, &(0x7f0000000040), 0xa8b) 19:13:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8af, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b0, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:14 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r1 = dup2(r0, r0) ioctl$KDMKTONE(r1, 0x4b30, 0x5) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x6a0400, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000040)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:15 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x10001, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xfa1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x20000000008012, r0, 0x0) 19:13:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0xb2000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b1, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:16 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) 19:13:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:16 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x80, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x402800, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc04c561a, &(0x7f0000000040)={0x7, "b1ea33901280d84df0b7e5e1eaf80f1a223208112e801b429395dce8bf2d71a2", 0x3, 0x5, 0x4, 0xff, 0x201, 0xa}) 19:13:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b2, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:16 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x28800, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4004700c, 0x693) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000081}, 0xc, &(0x7f0000000540)={&(0x7f0000000640)=ANY=[@ANYBLOB="28040000", @ANYRES16=r2, @ANYBLOB="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"], 0x428}, 0x1, 0x0, 0x0, 0x1}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000005c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000600)=0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) [ 2271.528321] IPVS: ftp: loaded support on port[0] = 21 19:13:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:13:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x3, 0x21) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000e00)) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b3, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) 19:13:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b4, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x10282) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @mcast1, 0x10001}, r2}}, 0x30) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) [ 2274.117298] IPVS: ftp: loaded support on port[0] = 21 19:13:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b5, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000100)={'bond_slave_1\x00', 0x1}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:21 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)={0xf1, 0x0, "f4e859b0ea8174dc05fe35f693079ecc372c034938434d29ecb5f763b6c9df62a6b27c6d4a9b3dc4d9786cf1f22069f1a4df0d89b70d44c1b44ab484fae02f5ca15a47aede8e9a98863ae2a3f043bfad928f92c992b9ced89b03dd87970f278bf16b94b8e5ae624e9c78fe3de96a0ecc5a9c804e0488b24a824d794e4c3426b6620cf395bd5ad76e6da4e42f40374dea935f48cc56f385f45c242a2c1b76263c969c5667ad5e8db71c12ccea2ae10410a057d0f8a6ab10f299f58e08d675bfcbb97317fafc6ccce91a4d30cc76ee168a3e49878888943185dce4e1a43c5e93727b958f5aa32f44abd6"}, 0x80100) 19:13:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:21 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b6, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:21 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xffffffbffffffffe) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) listen(r1, 0x2134) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x20000000008052, r0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) accept4$packet(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x14, 0x800) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) 19:13:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:21 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b7, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) [ 2276.662683] IPVS: ftp: loaded support on port[0] = 21 19:13:21 executing program 1: 19:13:22 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b8, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:24 executing program 1: 19:13:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8b9, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000ef0400000000000000cf7618060000f34bd8c65b6827a7676b5357"], 0x0, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @loopback, @loopback}, &(0x7f0000000580)=0xc) bind$can_raw(r1, &(0x7f0000000500)={0x1d, r3}, 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000e00)={0x33c, r4, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x95}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x85e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb7e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x74a}]}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9e43}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x11}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xccbc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5b7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xda16}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x33c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r5, 0xc0245720, 0x0) 19:13:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:24 executing program 1: 19:13:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ba, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:24 executing program 1: 19:13:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8bb, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2279.336133] IPVS: ftp: loaded support on port[0] = 21 19:13:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000380), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0xfff, 0x2, 0x1f, 0x1, 0x19, 0x7, 0x7, 0x783e, 0x3f, 0x6}) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r0, 0x2) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in6=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:26 executing program 1: 19:13:26 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8bc, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) r9 = getpgrp(0x0) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:27 executing program 1: 19:13:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:27 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8bd, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2282.034735] IPVS: ftp: loaded support on port[0] = 21 19:13:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="10000000000005000000010000f9d0804f25b63dfa00cf7618fafffff24bd8a7676b64c6c189ad39270000762fbf34054208165c4b6c50e220bc0966256180edda0339ff942c5c5238a6e4c8a38d792d2d423520c5b3890a41010da64cd40eaf413547971ba8cdc56341bc7db31b3133006f6a34fa5d99924617a6b9806a2790fb89a684acbea3680463f79dfd56f0efcb7b5c53c5c1ca80265ea647ce09814e198751809619ea335a965418f0232604"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000200)={0x1, 0x8001, 0x20, 0x706}) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e24, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x3}, {0xa, 0x4e22, 0x2, @mcast1, 0x2fb}, 0x400, [0x5, 0x3, 0xffffffffffffff65, 0x400, 0xfd, 0x5, 0x100, 0x65e632b3]}, 0x5c) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000100)={0x400000000000000, 0x6, 0x2, "a077f714430345b47f9ae746966463f9513278e48b2876d3d6d096f09cc6f1c4", 0x7f75535e}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:29 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8be, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) r9 = getpgrp(0x0) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:29 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8bf, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) [ 2284.581873] IPVS: ftp: loaded support on port[0] = 21 19:13:30 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c0, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x58) 19:13:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x3) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000380)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) write$uinput_user_dev(r0, &(0x7f0000000e00)={'syz1\x00', {0x3f, 0x7ff, 0x0, 0xcd66}, 0x4f, [0xf, 0xffffffff, 0xed8f, 0x2, 0x7ff, 0x0, 0x7f, 0x8, 0xff, 0x0, 0x2, 0xdbc, 0x800, 0x1316, 0xd7321d0, 0x5, 0xa3e, 0x6, 0x100, 0x100000000, 0x1, 0xffffffffbe09163e, 0x7, 0x40, 0xc95, 0x80000000, 0x9, 0x4, 0xa1e, 0x7, 0x2, 0x6, 0x9, 0x80000001, 0x1, 0x7ff, 0x8, 0x7f, 0x5, 0x6, 0x81, 0x400, 0x2, 0x8000, 0x1, 0xc4dc, 0xa30, 0x7, 0x10000, 0x6, 0x7ff, 0x8b, 0x2, 0xfffffffffffffffe, 0x0, 0x2, 0x40, 0x9, 0x9, 0xfd, 0x1, 0x2, 0x5, 0xffff], [0x0, 0x2, 0xd899, 0x5, 0x7a4a, 0xf43, 0x7, 0x7, 0x5, 0x65a40000000, 0x7fff, 0x80000001, 0x94, 0x7395422, 0x2, 0x5d2, 0x527, 0x9, 0x1be2e0000, 0xd2, 0x6, 0x401, 0x1, 0x9, 0x80000000, 0x3, 0x9, 0x54, 0x5, 0xffffffff, 0xe71, 0xe3, 0x4, 0x7, 0xe5, 0x1, 0x2, 0x3, 0x1, 0x4a, 0x1ff, 0x3, 0xffffffffffffc50a, 0xa9, 0xfff, 0xc00e, 0x0, 0x5, 0x2, 0x9, 0x100000000, 0x8, 0xfffffffffffffffd, 0x7, 0x0, 0x200, 0x4, 0x2, 0x1f, 0x3, 0x9, 0xfbec, 0x1, 0x400], [0x100000000, 0x6, 0x1f, 0xbfa1, 0x1000, 0x100, 0x8, 0x4, 0x7f, 0x2, 0x4, 0xfff, 0x101, 0xffffffffffffff67, 0x1, 0x3, 0x5, 0x1000, 0x1, 0x6, 0x80000000, 0x0, 0x4, 0x2, 0x3f, 0xffffffff9d1a4f67, 0x4, 0xa1a, 0xfffffffffffffff9, 0x8000, 0x5, 0x1, 0x1, 0x7, 0x8, 0x540, 0x101, 0xad, 0xfffffffffffffeff, 0x6, 0xd9e, 0xfffffffffffffe00, 0x1f, 0x7fffffff, 0xec86, 0x8, 0x2, 0x2, 0x5e, 0x5f22, 0x401, 0x1, 0xfffffffffffffff7, 0x3ff, 0x0, 0x8, 0xffffffffffffff7f, 0x401, 0x0, 0x401, 0x9155, 0x6, 0x8, 0xee000000000], [0x6, 0xfff, 0x6, 0x3, 0x1ff, 0xfaae, 0xffff, 0x61e, 0x63ad, 0x5, 0x80000001, 0x5, 0x6, 0x58e8, 0x9, 0x2, 0x1, 0x8, 0x6, 0x5, 0x7ff, 0x100000001, 0x6, 0x6, 0x8, 0xfffffffffffff533, 0x679, 0x101, 0x9c, 0x3, 0xab1, 0x3ff, 0x3, 0x6c0a, 0x10001, 0x9, 0xfffffffffffffff8, 0xffffffffffffffff, 0x2, 0x1000, 0x8, 0x101, 0x7, 0x8, 0x141f00, 0x1, 0x10001, 0x1, 0x7, 0xfffffffffffffff9, 0x8, 0x1, 0x3a71ced6, 0x6000000000000000, 0x80, 0x3, 0xe13, 0x3, 0x0, 0x7, 0x3, 0x4, 0xffffffff, 0x40000]}, 0x45c) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03'}, 0x58) 19:13:32 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c1, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) r9 = getpgrp(0x0) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:32 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c2, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x58) [ 2287.279572] IPVS: ftp: loaded support on port[0] = 21 19:13:32 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c3, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05'}, 0x58) 19:13:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000000580)={0x0, 0xfb, 0xc0, 0x2, 0x3, "56038cef0bfc938f6fd0166bb7a5e582", "2cbec1fc3c621cf42e760fd9cb832ce03139b4d71bf0a8d5f558a7b7be3d606668b7304e8dea55120d061c43849ec287641198b6a3ecb7af0e725862e70062f110f5e5eb408c6b79223f7babbbcb961a67b8787f8d8f1882afa619010e45e10c0cd37a07fbdf1e28a99077c75d6e7587ec22471788ea813f7f87a5611701bf9ff052f363471d421719fd736ed29df1fff76f5e171a6862bb19a176d88ce58a7f1f2c6b4fd71ec02764e1d5"}, 0xc0, 0x2) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:34 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c4, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06'}, 0x58) 19:13:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) 19:13:35 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c5, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, 0x58) 19:13:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:13:35 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c6, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2289.959543] IPVS: ftp: loaded support on port[0] = 21 19:13:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0086401, &(0x7f00000003c0)={0x6e, &(0x7f00000004c0)=""/110}) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000380)=0x14) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:35 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c7, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) 19:13:35 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c8, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:36 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8c9, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500ff0100000000000018060000f34bd8a7676b53570ec4346e"], 0x0, 0x6}, 0x48) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lsetxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64IPOUT\x00', &(0x7f00000004c0)='/dev/dri/card#\x00', 0xf, 0x1) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000580)=""/151) 19:13:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:37 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ca, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) 19:13:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:37 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8cb, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2292.781104] IPVS: ftp: loaded support on port[0] = 21 19:13:38 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8cc, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:13:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="100030e5020000000542370b3ab3a76ba9994220009776ff0702c64d6c6cf8ef16ef04500000"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) 19:13:38 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8cd, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:38 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ce, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:39 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8cf, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:13:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:40 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d0, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:40 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d1, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:40 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d2, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2295.818962] IPVS: ftp: loaded support on port[0] = 21 19:13:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) ioctl$TUNDETACHFILTER(r0, 0x400854d6, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:43 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d3, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:43 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d4, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:43 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d5, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2298.411493] IPVS: ftp: loaded support on port[0] = 21 19:13:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:43 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d6, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:46 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d7, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80206433, &(0x7f0000000380)=""/106) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r1, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40047703, 0xffffffbffffffffe) 19:13:46 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d8, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2301.297245] IPVS: ftp: loaded support on port[0] = 21 19:13:46 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8d9, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:46 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8da, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="10000000000005227371662b1231ee7618060200f34bd8a7676b53574e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) utimensat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)={{0x0, 0x2710}, {r2, r3/1000+10000}}, 0x100) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) 19:13:48 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8db, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x57) 19:13:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r1, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40047703, 0xffffffbffffffffe) 19:13:49 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8dc, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x20000158) 19:13:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:49 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8dd, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2304.120731] IPVS: ftp: loaded support on port[0] = 21 19:13:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x28000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x484000, 0x0) syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x9dada3e70a18d12e, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000001c0)={0x8, 0x9, 0xffb}) 19:13:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000200000500000000000000cf7618060000f34bd8a75d1ff14fc4bdd3ba"], 0x0, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=@random={'trusted.', '/--keyringsystemproc,wlan1\x00'}, &(0x7f00000003c0)='\x00', 0x1, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000500), &(0x7f0000000580)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) 19:13:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40047703, 0xffffffbffffffffe) 19:13:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x202040) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) sendmsg$nl_generic(r1, &(0x7f0000002640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002600)={&(0x7f0000000240)={0x23b8, 0x18, 0x0, 0x70bd2a, 0x25dfdbfe, {0x9}, [@generic="8ecf9c8f9bfaa25987491a2d1bd716c586bf03d69a3767799af89cfa11202cccc26d0b165b45a920ad879829c561435e12868078398ddbc7b952d2d1ddea52582fff2d643211aa62660fc3139a1aa9c5a06ecb160de570525211e70e3581228c6add8a3533eb0229cd283a275dab3b9d2b3e950823d724bf5b77e409c80c5c5ba6ae1dc12eb7bfe33d07ab9563a1277a0d3e3513d9987273f2645cba294107afdc0b4b145c49f8b9f30572be64076a9c0279081f373daeaf0bab8db48d3d76165a79bd3cb65354023e4b3f966627ed688f88a69811f6544aaf", @nested={0x1004, 0x78, [@generic="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"]}, @generic="11d3716e6b483cbd69e1952939c85ce34be6e06ca032ed280242676f6ac2988dc8c901ae7187fb436de92838405f166f06f183c1f3de1dac69b036af37015d2b89ede59fbb8c8ac88d1756993471e94a23c2ee663ffa2e153f4fe0954586629b2eda9457b4f8125114e9e346c47cbf6a92538b89f6de1e9c06f4fb12191c723d8f6a548230b7cbf605e49d0160130f257c427b12a3494e27cb9e9d2863fd9b1fe89126abc3680c83aff357ab5190f26898f1e0f3745f4f3bc6a77b642191b729da2b2ed44d93172798710780d58838e9f749", @nested={0x11f4, 0x80, [@generic="11b770f7f996e13a9935cd092108232fd4280844d8ba8c88e96d5d91f563fe6f8a4239dd5917ce4ad773677dfb71794f2e3bde9d8627a8dd41501acaf2e5b503", @generic="b645696c3b37b6b6275597e2459d3d17bf3a1741e97a0fd78a5623acf0010ff7856a45722a5f861fa5eadb1979a2db5369d28e703411e8ac7619f48c8903ce94d43a9857a0abbb4960f5b31244dcc8db991300fe229d7689778c4a5ad65803f79eb05145dd54f1257981c088627f14d7c7d815615be3ccfab83458c4c23a4fc56c4f94d8035df119a9e4d534dba19c5ad3ff0f9ade8d57289ad0c633333b22b79385737938d33f7fc9f35a5049f93a846db9b9d844865a21e3", @typed={0x4, 0x5b}, @generic="9e55d9ffb292f1ceffffa6d357a8c2fb9ce99434b4774eb0c5a9d8af1e937c3c8f6827b3aa0458ebde34559dc47c999cff5a130fdec3b099833319f5934f77e1c5e2a790028caaf17c097c428f3761923052b66a5051db133fdf93147994182825fb88e22879f30efe1e364f9ebb87", @generic="68c280600a74ed26da41f9b970ce528d0b432d54e6e61a7bb5a7398a8dd4bd8cc7651dd4dd6a90a49bc271861ee0e4729fc58abaecc709e821714424fb015bd5af30f88abfaa9dc4ac78d1ede5ab5a110ecd8c36ac8473885ab5d4d3327330698a7a1aba3e3dca356757c493f0df6b127d178aaf", @generic="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", @typed={0x8, 0x54, @pid=r2}, @typed={0x8, 0x4, @str='%\'\x00'}]}]}, 0x23b8}, 0x1, 0x0, 0x0, 0x20008095}, 0x8000) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),xcbc(fcrypt-generic))\x00'}, 0x3f4c) 19:13:50 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8de, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:13:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r1, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:13:50 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8df, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0xe000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=0x0, &(0x7f0000000200)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x6, 0x9, 0x5d18, 0x80000000, 0x3, 0x9, 0x7fff, {r3, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x4, 0x40, 0xffff, 0x5}}, &(0x7f0000000380)=0xb0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3ff, 0x3) setns(r1, 0x48020000) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='proctrusted&vboxnet1(\x00', 0x16) 19:13:50 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e0, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:51 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="10000000000005000000000000000200000000000000d8288770a7676b53570e89e56e"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, [], r0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000580)="447703a9af61d80066d366a2dc5470874d1fec10584b75406acca90a317673e3c24596725a44ffd07c16b16d280d3202adf8dae749adea9a1f2da0d5a3a6665e3c00faf4cc222f7471cc543bc561ef90534c740f0f5400a9a38ba48022a007220d8688f5c7c41b2fc85ae42c25f257a1547ec7cc9d380a9b99b22271bd90baaee1f93b1bfb891b4b6bde79a1adc83aab679e508300adcf", 0x97) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x80}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000003c0)={r4, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000200)={0x2, 0x7, 0x6, 0xfffffffffffffbff}, 0x8) 19:13:51 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e1, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getrandom(&(0x7f0000000000)=""/75, 0x4b, 0x2) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r8 = getpgrp(r7) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r8) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:52 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e2, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x200000402, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x11, "536e8eb5"}, 0x6, 0x3) 19:13:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:52 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e3, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2307.048862] IPVS: ftp: loaded support on port[0] = 21 19:13:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="10000000000005000000004bd8a7476b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000100)={0xe, {0x7, 0x200, 0x1}}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:13:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:13:54 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e4, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r8 = getpgrp(r7) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r8) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:54 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e5, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x10000, 0x0) sendmsg$can_raw(r1, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x0, 0x6, 0x1, 0x80000000}, 0x2, 0x3, 0x0, 0x0, "d89c016f123ca30e4e280f3bff88832ed3066d895127e0e423232301fa61de6f080808db9e0f34dc8573652a72b8e0b691b8755317440ba502d2c92432a9b1bc"}, 0x48}, 0x1, 0x0, 0x0, 0x20044000}, 0x10) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x82e, 0x8}, 0xc) [ 2309.621395] IPVS: ftp: loaded support on port[0] = 21 19:13:54 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e6, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:13:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:13:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r0, 0x0, 0x12, &(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff}, 0x30) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000580)=0x6) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x2, 0x4, 0x4, 0x5, 0x0, 0x6, 0xa, 0xf, 0x10001, 0x8, 0x2, 0x4, 0x5, 0xfa9, 0x101, 0x9, 0x1, 0x6d89, 0xed8, 0xe000000, 0xf, 0x0, 0x8, 0x0, 0x9, 0x3, 0x1, 0x0, 0x1f, 0x1, 0x5, 0x1f, 0x1, 0x7, 0x2, 0x4, 0x0, 0x10000, 0x6, @perf_bp={&(0x7f0000000100), 0x2}, 0x10000, 0xffff, 0x4, 0x7, 0x0, 0x4, 0x6}, r2, 0x1, r0, 0x1) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:13:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000180)="9ffc60de4fb3458621df790fac97948733c0055deb645fb5bb7c88ae6e8849e040919f1f1d73aabc9132e348f02f795c8d412c6eb64efa45d0e04cdc1b6bde97875a7faf452cb76ef59b9fac558638207dff48c38cda63502bbda0c3402af52e73d71dda5a4743db7787dc600b98e409aa26e62cbdba9fa362b4e95dd59e253514199bc5a0a2ba6027e46c30ccee0f37aba1f081aa2211524c30ca74a4ef934de9031a7e59f3e6f8f30be58ad72bdc9b732f5aecbed5c62369caa3877ca3d1f32f760ef354f2667d671aaa8ffa4030e2b21d0216001bd6d147e8") r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0485510, &(0x7f0000000380)={0xff, 0x3, 0x1, 0xfffffffffffffff8, &(0x7f00000002c0)=[{}, {}, {}]}) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r3 = open(&(0x7f0000000000)='./file0\x00', 0xae05fd7a91b08e9d, 0xa8) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000000c0)={r4, r5}) 19:13:57 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e7, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:13:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r8 = getpgrp(r7) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r8) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:13:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004004}, 0x10) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:13:57 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e8, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:57 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x2, 0x2803) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000001, 0x30, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setrlimit(0xe, &(0x7f0000000000)={0x989, 0xfffffffffffffffc}) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2312.289330] IPVS: ftp: loaded support on port[0] = 21 19:13:57 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8e9, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:13:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000380)={0x1d, r2}, 0x10) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000200), &(0x7f00000003c0)=0x8) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) rseq(&(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x1, 0xa4, 0x6, 0x9}, 0x1}, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:13:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:13:59 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ea, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:13:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000000, 0x800) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) fsetxattr$security_evm(r1, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="5800bb67575aba34332e27fe7a9fee9fc528c63617a29d299f9c44e40dd13f972fb7fbbd6b74e0b7eda7afbecd9e8ac712c4ac61ed6dcdede13b5f18765e7eff19e51b403f0be2f95973e36adc0eba02ec91b56ac4d751e9aacc74bfee606878d074272119839de0b6db9871ba29464c04caefcc096927489542906b5bb099ef9ee9f236e811cd281c6fe53ae74e0052081731093e410f0a92f9bd1a1d965160278890d66359c06532dff4777b570da42a7423bd69a44eeaa0169b"], 0x2, 0x1) 19:13:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:13:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/current\x00') syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x41, 0x20000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x18000, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) 19:14:00 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8eb, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2314.894257] IPVS: ftp: loaded support on port[0] = 21 19:14:00 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ec, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) connect(r0, &(0x7f0000000000)=@x25={0x9, @remote={[], 0x2}}, 0x80) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) clock_getres(0x7, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:00 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ed, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ee, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x7, [@dev={[], 0x23}, @dev={[], 0x15}, @link_local, @local, @random="c917319469ac", @remote, @local]}) 19:14:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ef, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000100000000000000000000007e1b04000000ffff000000000000000000"]) r3 = socket$alg(0x26, 0x5, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100005}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="580000008c23ac46690758ae1a5f433c4bfa85407266a328d47d882f8f116f6f6272e8877a3c07fcc324f50caf0fdb4b4b82531419031b6a", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r4], @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000840) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="100000000000050070cb0000000000003d4911fed8b4f6a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000ec0)=0x0) getresgid(&(0x7f0000000f00), &(0x7f0000000f40)=0x0, &(0x7f0000000f80)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000fc0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001000)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000001100)=0xe8) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001200)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) stat(&(0x7f0000001340)='./file0/file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001400)=0x0) getresuid(&(0x7f0000001440)=0x0, &(0x7f0000001480), &(0x7f00000014c0)) r13 = getgid() sendmsg$unix(r0, &(0x7f0000001580)={&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000004c0)="c680124508a8979b85330b1723ca6d91b7694db132a4c9a8ccb91fb95ba9ac65f4eb51fe4f94afb35386f9e1c636b60add69aaed0127fa4ca87fb6d6266facc2915798576f7911a62cea0a2f6106f24ef5754e5b1046d593c50d7657bbf94cb228a9299f3b43f15aa0bfaeebeed84192180756e69aead04e003133", 0x7b}, {&(0x7f0000000100)="2cbe18e80eaf45915ed95f9e99ea933bc7acc8b2b53fee2845b610bab33e0eb49ffb20ca56f2ac", 0x27}, {&(0x7f0000000580)="e30766015db5629a04c1a595ba4991e4b6b37b8260bf5fbcdfbda451d48b43afd42a29b34bf56aa6ebfdcd8bfa47f1f478730e2c9531a8ca25cde8b98267dbe9b79b8b55ae324e2d3ec4a12a0ec79766532eef1bc629ce4055227c24b90c75ca3e571e54", 0x64}, {&(0x7f0000000980)="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", 0xfd}, {&(0x7f0000000600)="dce093aa100f6b5eee34767c83bc600c787df4837cbd25001d072eff60be53a82c209227c608622eea8184ba65e288a8ae629a564be35969b03a9c1d", 0x3c}, {&(0x7f0000000e00)="3e43f3b40d329de7dc66f458ca3419d1d112a222c93c25c2007ebc9e6ff872ee3402236555a0ff1244d65be9e9143ec202610219b3bdd81279288d391b42b32e5a3f2124a55f68135d1befabd8d506618d5245a192882d72712cbcb0eb36cc0d54c7d065add4cc5ce59e29f5f14598e12c083f0bd918d38727f6bad9597e12e5fe2929a64e250171", 0x88}], 0x6, &(0x7f0000001600)=ANY=[@ANYBLOB="180000000100000002000000", @ANYRES32=r3, @ANYRES32, @ANYRES32=r4, @ANYBLOB="180000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32, @ANYBLOB="180000000100000002000000e0857c3bcbe61e8cf9d57d0717a2087adbb0c8aa967741c16a4d5defe39fdee287eccc3464433ff36beb7b7c8d77e4a92675efefe2756baf7147b2a391318c81997bb250c141000100006aad825bd580e356ae8642785c77cb304c1e9fce414a60493defb2271180e7319d01", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="180000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="180000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13], 0x78, 0x20000000}, 0x44015) r14 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r14) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r15 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r15, 0xc0245720, 0x0) 19:14:02 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f0, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={0x0, 0xf98b, 0x8001, 0x1, 0x6, 0xfffffffffffffff9, 0x8, 0x401, {0x0, @in6={{0xa, 0x4e24, 0x6, @rand_addr="3e2b81ee40f78849158dc77a1c916119", 0x3}}, 0x4, 0x7fff, 0x3, 0x7ff, 0x6}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e24, 0x101, @local, 0xdc}}, 0x5e7}, 0x88) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{}]}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x3, 0x0, 0xffffffffffffff81, 0x1, 0x20}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000200)=ANY=[@ANYRES32=r3, @ANYBLOB="07002d025d55fe622efacd8d49f54b045cd90c56b20c811e2bcd7caca46c7015490bd938cdf59cdf918c684c1a7e7998f2"], 0x35) 19:14:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:02 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f1, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x18001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7ff, 0x4) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:03 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f2, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2317.968314] IPVS: ftp: loaded support on port[0] = 21 19:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/42, &(0x7f0000000180)=0x2a) 19:14:03 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f3, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2318.560374] IPVS: ftp: loaded support on port[0] = 21 19:14:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="10fffffffa000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4400, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x53, 0x17, 0x1, 0x5, "fb0e726b275058d11ba04d7909ff28b4bf9c85e5507b938fd0d3720ea413f385"}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0xc9) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8080, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) 19:14:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:05 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f4, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') exit(0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:05 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f5, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f6, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2320.948502] IPVS: ftp: loaded support on port[0] = 21 19:14:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f7, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffff, 0x200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f0000000180)={{0x4, 0xc00000000000}, 'port1\x00', 0x80, 0x4, 0x401, 0x7, 0x3, 0x3f, 0x6, 0x0, 0x6, 0x2}) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffdd1) 19:14:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') exit(0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:08 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f8, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:08 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8f9, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:08 executing program 4: syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x1000, 0x111000) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = dup3(r0, r0, 0xdaf97e701ca3edb) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r2, 0x4e}, 0x8) io_setup(0x2000400, &(0x7f0000001500)=0x0) io_submit(r3, 0x2, &(0x7f0000001400)=[&(0x7f0000001280)={0x0, 0x0, 0x0, 0x7, 0xe07, r0, &(0x7f0000000280)="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", 0x1000, 0x800, 0x0, 0x0, r1}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x8, 0xff, r1, &(0x7f00000012c0)="8a128a86f37e04485fa93f79cc64d987de1745d74dce7a719188beb6218b5b7bb0d2d710d221e5bb53714e2eb239517f6f438fbf535e888d15421bedb14b86ac024809eb0ba8e1de467d3d2465595404a45f2af51901bf273d12406b6b20106c864e978cea3f5d4d90d0c7664c7d622031865ba8dab9a59ebef682fa907652872e767ee91ba6fd352a2ee67c3090b111ff69b7948b30418ee86502a9242ba8e46682a80eb0b2ab8f9f928cf7401f6265b5dd065bf663533c19003720bb3601e4b28da7214423a1ce633773cb0a4970d642f9", 0xd2, 0x7}]) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x98a, 0x28001) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000040)={0x4, 0x5, 0x1, 0x8, '\x00', 0x1ff}) [ 2323.531458] IPVS: ftp: loaded support on port[0] = 21 19:14:08 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8fa, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) seccomp(0x0, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x1, 0x1000, 0x4}, {0xd7, 0x40, 0x800, 0x1}, {0x1000, 0x0, 0x4, 0x8}, {0x40, 0x6692, 0x5, 0xfffffffffffffffc}]}) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x3, 0x238a82) mount(&(0x7f00000002c0)=@sr0='/dev/sr0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='romfs\x00', 0x2, &(0x7f0000000380)='skcipher\x00') getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="080000000a00000005000000000000000200000000000000090000000000000007000000000000000000000000000000080000000000000009000000000000000100000000000000060000000000000096e0000000000001000000000000000081000000000000000600000000000000ff07000000000000040000000000000007000000000000002fc8dd3ab98c75481071ec702e3fb744ecf81afef19527bd61f190498cfbc4780ca226e7c7ba9380e12746b73a94368759725a23840797799afb92e37258776835bd10a2329b3e4467f35adda161f0469c42febfb8043be309cb4021ea8a224d86a787"]) 19:14:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1000003fcbc63300000000000000cf7618060000f34bd8a7676b53570e89e56e87a9c5e8c8ed989b985ec8f51865173c7bdfc34605fcf2d3e68a19064ece9f88736ce739684340bc31d698043ae3f930f54c4a40bc31b96d66f506026ae90d"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7adcc3ee, 0x20}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000580), 0x100) prctl$PR_SET_FP_MODE(0x2d, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', &(0x7f00000004c0)=@v1={0x2, "fe26e4215f70b7e3093fe71bce72795127d0"}, 0x13, 0x1) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) write$P9_RAUTH(r3, &(0x7f0000000100)={0x14, 0x67, 0x1, {0x3, 0x4, 0x3}}, 0x14) 19:14:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8fb, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06055c8, &(0x7f0000000240)={0xb, 0x9, {0xe83ed7567b1b4ca2, 0x7, 0x7, {0x796, 0x2}, {0x7, 0x7}, @rumble={0x595d, 0x6}}, {0x55, 0x1ff, 0x2, {0x1f, 0x80000000}, {0x5, 0x5}, @period={0x5c, 0x5, 0x5, 0x80000000, 0xffff, {0x7, 0x7ff, 0xd79, 0x9}, 0x4, &(0x7f0000000040)=[0x7fff, 0x0, 0x833, 0x9]}}}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000180)=""/146) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') exit(0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) [ 2326.067553] QAT: Invalid ioctl [ 2326.073821] QAT: Invalid ioctl 19:14:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) [ 2326.126425] IPVS: ftp: loaded support on port[0] = 21 [ 2326.137718] QAT: Invalid ioctl [ 2326.141157] QAT: Invalid ioctl 19:14:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8fc, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) flock(r0, 0xd) 19:14:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8fd, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:11 executing program 4: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x57, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2326.893988] IPVS: ftp: loaded support on port[0] = 21 19:14:12 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1701}}, 0x0, 0x20, 0x0, "29fc319f2ffda70d73f8f7fc073c675336f7cdf8926188aecd8b65e0fa2ced1472faa9317d15c0a4783f8d83fe74ab754882a70c4245c7b723d1a021117255e37f46cb1f9c1fde10bb40c048b236db49"}, 0xd8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="10003f03f03600000000000000060000f34bd8a7846b53570e89e56e0000000000000000000008000000"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:14:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8fe, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) sched_setparam(r1, &(0x7f0000000040)=0x3f) 19:14:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x8ff, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx2\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0xb2, 0x4) setsockopt$inet6_dccp_buf(r1, 0x21, 0x0, &(0x7f0000000200)="ed980d1436d3d7ef2b81463cdd2374bfc4ed7fc7c97590f848846e28230b105c18e1a0d9573bea3623f4e0f6dcd5a79e1fca7cdadbbf5d1a34a6015cb694a2f75f5fa87b35752e37094a379f2b304fd345d0de342206cd9ab90ff0ffb0c78c0237b866fa8c00e969a90bf53d28f98e694decf4d3cd801151df5bf95290a37bb26c9ad2e1f66cbfb12b04377312eb58b663bfda1298eafccc6ce5eb82e23c2774a9780c7ccd64dc31485912f51c09e26e01663b0daed7fe19cd52e0", 0xbb) 19:14:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:12 executing program 4: r0 = socket(0x11, 0x7, 0x3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="8cdec07516508c28d50c8fbc41910c206433372c7e22c92d72b34a07596bcde2212a16298307f7d2344209bdd9701b24e10caf1bcd2260bbfa66627d9d9a20be435ad5776733df872144e9eb5b38900909acf2b79378a27e41e653d9aff145dd6d30ad66e9e328f3f389c37dff34f0e1ba9f6a761042dfff6847107b66cb1a6b49531a7e673b8ab5d6f1605ba5", 0x8d) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x103400, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000040)={0x6, 0x1, 0x7}) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f0000000240)=0x4, 0x4) 19:14:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x900, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) bind$rds(r0, &(0x7f0000000100)={0x2, 0x4f22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x25) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r0, r2, 0x5, 0x1}, 0x10) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x3, 0x6, 0x0, 0x6, 0x4, 0xffffffffffffff9c, 0x7}, 0x2c) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:14:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x901, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x902, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 19:14:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x903, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000000000cf761890552dc319d0952e2d800600f6f24bd8a7676b0e8946de"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x410000, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:15 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x904, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000004c0)={0x114, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="09631040", @ANYRES64=r2, @ANYBLOB="040000000000000011634840000000000000000004000000000000000000000010000000000000000000000038000000000000000800000000000000", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="0000000004000000000000008561646600000000090000000000000000000000000000002700000000000000"], @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0f0900000000000000634040010000000000000001000000000000000000000011000000000000000000000000000000000000000800000000000000", @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0e630c40010000000300000000000000072304400300000010630840040000000000000011634840030000000000000004000000000000001700000010000000000000000000000058000a00000000001000000000000000c7f2ebfe8f1b53dc75b5b08d2d4c43998515b19650c433e3772ec3e1c8c8f1e0", @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYBLOB="8561646600000000060000000000000004000000000000000200000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="0000000001000000000000008561646600000000080000000000000001000000000000003400000000000000"], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB='`\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="8000000000000000"], 0x10, 0x0, &(0x7f0000000480)="def034f2a99a3a436d2ec9c023e72bd8"}) set_robust_list(&(0x7f0000000400)={&(0x7f0000000340)={&(0x7f0000000200)}, 0x7fffffff, &(0x7f00000003c0)={&(0x7f0000000380)}}, 0xc) 19:14:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x905, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x400000) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000c0, 0x0) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0xa4, 0x1000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000040)={0x0, 0x1, 0x3005}) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000200)=""/14) 19:14:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) [ 2330.915679] IPVS: ftp: loaded support on port[0] = 21 19:14:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x906, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400400, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000200)={0x0, 0xdd47}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xb, 0x60000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000180)={0x4, 0x1, {0x3, 0x1, 0x101, 0x0, 0x7}}) 19:14:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="100000cf7618060000f34bd8a76789e56e0000000000000000000000"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x1, 0x2}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000500)={r2, 0x80000001}, &(0x7f0000000580)=0x8) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000380)={{0x2, 0x4e24, @rand_addr=0x5}, {0x6, @local}, 0x48, {0x2, 0x4e21}, 'vxcan1\x00'}) 19:14:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x907, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:16 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x6000, 0x0) connect$vsock_dgram(r0, &(0x7f0000000180)={0x28, 0x0, 0x2710, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000001c0)={'lapb0\x00', {0x2, 0x4e24, @empty}}) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) 19:14:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:17 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x908, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x2004, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x1, r2}) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) move_pages(r2, 0x6, &(0x7f0000000180)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil], &(0x7f00000001c0)=[0x8000, 0x4e02, 0xffffffff, 0x800], &(0x7f0000000200)=[0x0], 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:17 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x909, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0xfffffffffffffdd8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'ifb0\x00', {0x2, 0x4e21, @rand_addr=0x100000000}}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x40}, 0x8) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) flistxattr(r0, &(0x7f0000000040)=""/93, 0x5d) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="af0000000000000006000000000000000800000000000000", @ANYRES32=r0, @ANYBLOB="00000000a60000000000000000000000000000000000000000000000", @ANYRES16=r0, @ANYBLOB="00000000020000000000000000000000000000000000000000000000", @ANYRES16=r0, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="000000000400000009000000000000000000000000543388ee958b5e326b00000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000f9ffffffffffffff00000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000000001000000000000000000000000000000000000000000"]) 19:14:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r3, &(0x7f0000000140), 0x10) setsockopt(r3, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r3) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x2) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syz_tun\x00', 0x1000}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000380)={0xfff, 0x6}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) 19:14:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x100000139) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}}}, 0x20) ioctl$TIOCCONS(r1, 0x541d) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000300)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0x5}}, 0x18) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000400)=0x1, 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0185648, &(0x7f0000000900)={0x9f0000, 0x8, 0x5, [], &(0x7f00000008c0)={0x9f0942, 0x7, [], @p_u16=&(0x7f0000000180)=0x101}}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000009c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB='`\t\x00>', @ANYRES16=r3, @ANYBLOB="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"], 0x160}}, 0x11) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000003c0)) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) epoll_wait(r1, &(0x7f0000000440)=[{}, {}, {}], 0x3, 0x6e0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@broadcast, @in6=@empty}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) 19:14:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x90a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r1, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x90b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x9, 0xff, 0x1ff, 0x7fffffff80000000, 0x0, 0x800, 0x4, 0x0, 0x8, 0x2, 0x8, 0x3f, 0x8001, 0x101, 0x10000, 0x8e3, 0x1f, 0x2, 0x5, 0x40, 0x8000, 0x3d, 0x1ff, 0x3, 0x1, 0x8, 0x1, 0xffffffffffff0000, 0x0, 0xbc, 0x0, 0x80, 0xfffffffffffffe01, 0x7, 0x5, 0xf3d, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x7}, 0x8004, 0x8957, 0x0, 0x5, 0x7fff, 0x1, 0x1}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x1) mmap$perf(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x8050, r1, 0x0) 19:14:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x90c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2333.932791] IPVS: ftp: loaded support on port[0] = 21 19:14:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f24bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:21 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xa49, 0x404100) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0xa8, 0x1, "b497fc521f24ef658d2e136dd584405b11221d353c292cb16262e73292e3c41e1a64e7e883929d9f56e2f19ad14a21f18d139acf1ef7438dd4cc0206c1a50f53fcc20f2c95e42f5d6394539d3c38457a1a18100c0f4c80c9290a6126968484f06b015715b4ca41b36105cf362f3bb512ed3e886eca21322973353969af0d3de1de446cd7006d93587c77e269e48303b291840c342eac248d70b764919202b9bb"}, &(0x7f0000000080), 0x400) pread64(r0, &(0x7f0000000280)=""/19, 0x13, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x9, &(0x7f0000000240)=0x4) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r1, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:21 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x90d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89ea, &(0x7f0000000000)="6f4f86b435b76f9723fe5985f745acb928496a256af5d8673456d180ae7f427f07f3efb83236e0e42b725645a3c9d91c6a7413a0b6b8bdd645f6741b373e4ee92fd35f6488698af72230cf8e52c5142f2dca319913423201226a61b6adc4e49c818222d6ce78") bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0xffffffffffffffbd) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:21 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x90e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x1, 0xffff, 0x2}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2336.464911] IPVS: ftp: loaded support on port[0] = 21 19:14:21 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x90f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e3111a95fd0e9ab10dac01411daa31ddecfc93bf1e3fe13cc60cca0bbe4fad73bcde7df4e334b7453d7c35190bcd46b0ddc1cd740c40d9567f14e34b8c5e85d256734fa533ebdd528bc60aef0053c1764cd7e4bbeed9e5b7d15e702838eef4254a777198abbd744a94d88d5c58512b68fc92c5b01ba3a6a93a962592a3a793db4f13a36623a0c2583436943070965cd21fa3cfabba7fae39fe6bd0c348192d5bd5fd6ae"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0xbb, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) accept4$packet(r0, &(0x7f0000003e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e80)=0x14, 0x800) bind$packet(r0, &(0x7f0000003ec0)={0x11, 0x18, r3, 0x1, 0x10001, 0x6, @broadcast}, 0x14) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) ioctl$void(r1, 0x5450) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) 19:14:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x910, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x8}}) 19:14:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) socket$inet(0x2, 0x1, 0x20000000084) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r5, r6, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r8 = getpgrp(r7) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r8) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r1, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x911, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x1, 0x2, 0x0, 0x7, 0x8, 0x9}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x912, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2339.161190] IPVS: ftp: loaded support on port[0] = 21 19:14:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:24 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x913, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000100)={0x0, 0x8}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) ioctl$CAPI_INSTALLED(r0, 0x80024322) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x20}, &(0x7f00000001c0)=0x8) 19:14:26 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x914, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r7, 0x40047703, 0xffffffbffffffffe) 19:14:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) socket$inet(0x2, 0x1, 0x20000000084) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r5, r6, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r8 = getpgrp(r7) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r8) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:27 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x915, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x54f85e4e2ea7a45f, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:27 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x916, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2342.045814] IPVS: ftp: loaded support on port[0] = 21 19:14:27 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400800, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xe0, 0x5, [0x10000, 0x74c0000000000000, 0x10001, 0x86, 0x40]}, &(0x7f0000000200)=0x12) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0x7, 0x7650, 0x4, 0x9, 0xffffffffffffff80}, 0x14) bind$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$inet_sctp(0x2, 0x5, 0x84) 19:14:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000a40)=0x1000) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) execveat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000980)=[&(0x7f0000000380)='self*\x00', &(0x7f00000003c0)='trustedself$cpusetsecurity#lo-\x00', &(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000500)='\x00', &(0x7f0000000580)='/dev/amidi#\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='wlan0em0ppp0security^.security\x00', &(0x7f0000000640)='prockeyring\x82,\x00'], &(0x7f0000000a00)=[&(0x7f00000009c0)='-nodev\x00'], 0x1000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0245720, 0x0) 19:14:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r7, 0x40047703, 0xffffffbffffffffe) 19:14:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:27 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x917, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) socket$inet(0x2, 0x1, 0x20000000084) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r5, r6, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r8 = getpgrp(r7) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r8) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:28 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x918, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) rmdir(&(0x7f0000000000)='./file0\x00') 19:14:28 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x919, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x400000, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(sm4-ce)\x00'}, 0x58) 19:14:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000100000000cf7618062000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000380)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @multicast2}, 0x22, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000100)='nr0\x00', 0x2, 0x2, 0x668}) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x105000, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:29 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x91a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r7, 0x40047703, 0xffffffbffffffffe) 19:14:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x180) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040), 0x2) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:30 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x91b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:30 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x91c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) [ 2344.951956] IPVS: ftp: loaded support on port[0] = 21 19:14:30 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x101000, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000300), &(0x7f00000004c0)=0x40) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000002c0)={0x100, 0x575fa297, 0x4, 0x2, 0x401}) mlockall(0x4) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x17f, 0x1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000340)=""/96) symlinkat(&(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000500)='.\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00058da400080002000300000008000200ffff00003c00090008000200060c000008000100000200000800010001800000080001000000000008000100c400000008000200029c61d84eb600000000000005a6fd94ae038e79d70e017a3a8cdaeda61da3ceebae6edb7821d2399bd21c4babcb776f1e7fcf5b09edcb93396533ad0f5f3ffbf8ade75c770173f439b41f95cfec4a1c688581d2ef47819c7bbb04fbb32dbf0bab6c851781dad82b68df24b925455e0714cd4ed0f0c2baf08170c73e"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x80) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000006c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) 19:14:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="e53e908c6e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:32 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x91d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:32 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x408200, 0x0) socket$l2tp(0x18, 0x1, 0x1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000240), 0x5, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) ioctl$PPPIOCDISCONN(r0, 0x7439) ioctl$sock_netdev_private(r2, 0x89f6, &(0x7f0000000000)="e8f0a8086b165a5e52f5b6f92b5858156a24417c970c06e186cd98313ec3e585b2d324ae2a0fa69b3299bf38683c39ac17fa9aa65fb88cdfa541e13380b0de1008575b013d2fd56c60aacf42920099c7076d591ad610c16e40c73ad567ba2db82b03e7ed4401f8766b90d790179c9659") bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r3 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="f06c74e0505c87146aea09f14323770212e77c503393bb7cff6d7786b8683658975a1f85ab92327e5c21b5f3be7598a494feb8477b48cb3716a74d23d3303ce906096cc2e4ae5d34f587de19f9fc71531092b47de9e8fea6f4df39687a848ef88fed46634091665659a4c7bf63826782ef3ed8a1e5400d59d60df0485083e3b6a66c9ad27923f6dae3b606eb0905cca9ac7b61250acf6ced3fe4ab3b44c845eb3a901200d5a78305d984a272056d135c0263362410", 0xb5, 0xfffffffffffffff9) keyctl$setperm(0x5, r3, 0x10000) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000400)={0x1, {0x9, 0x1, 0x8, 0xfffffffffffffe01}}) syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x1, 0x20000) 19:14:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:32 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x91e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8001, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x6, 0xf3}) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:cron_spool_t:s0\x00', 0x22) 19:14:32 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x91f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2347.634036] IPVS: ftp: loaded support on port[0] = 21 19:14:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:33 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x920, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000200)=0xf, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000080000000500e5ffff050000006e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) symlinkat(&(0x7f0000000600)='./file0\x00', r3, &(0x7f0000000640)='./file0\x00') setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) r4 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'team_slave_1\x00', 0xcd83}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0286429, &(0x7f00000005c0)={r5, 0x3, &(0x7f00000003c0)=[0x5, 0x4, 0x7fffffff], &(0x7f00000004c0)=[0x0], 0x10, 0x4, 0x5, &(0x7f0000000500)=[0x3ff, 0x7fffffff, 0xff, 0xfffffffffffffff9], &(0x7f0000000580)=[0x82f66eb]}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) preadv(r0, &(0x7f0000000e40)=[{&(0x7f0000000980)=""/241, 0xf1}, {&(0x7f0000000e00)=""/60, 0x3c}], 0x2, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r6, 0xc0245720, 0x0) 19:14:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = socket(0x1, 0x7, 0x10001) sendmmsg$alg(r1, &(0x7f00000080c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="234e72cdfe5abf297f1d5d5d755aa391bdd13b6658e66cd99138c681a7e45c66c2d45f0f56205f2bfba2325a5162288258642527d251ce26720728433f998d08b8aca8519c1514af8f9b23", 0x4b}], 0x1, 0x0, 0x0, 0x4000001}, {0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000001c0)="13f79cba27d69e1071521031f19da55b9fcf8ffde3f02ae6e475cbace7e57eedea396868236adcbbb25e4f49bf0bfe1da2688a23bcb791a911cf51a9ca0dfab414f2515c0af3388f85b3ef9a33a79355c1bd51e1b30888228856e98d62dc842ef5e43e68f2d96ff3446eb9509beade599a215e75c6f176e6", 0x78}, {&(0x7f0000000240)="a90efe65cfaa8e48c364ac7b7bdc14e227f043", 0x13}, {&(0x7f0000000280)="94ee94518f52da323354265baafe4f75110842f5483d334984698361487736fe68a188cf6027646dd841314396ff54273865d9a64092b9380af50e9695cf72e3fdfaaa30041952eda0ee580cc87370bdaf1f", 0x52}, {&(0x7f0000000300)="081c6291cca0ac60495e14b96b68d5a6f0e6ac806c0cd3039804ed683c09b09ba6050451e8a313dbf6b0e4aeca15dd1db082c6773e1a37bd4752d601f49acc50de69cb8fb010742cd1b87dfc3a3e10", 0x4f}, {&(0x7f0000000380)="3f55d055b6d3680081d98c9b1a06003761fa67d827627bb16f9a99761d0a5c3444b5665d6b21e6b8157c0e4172d2e491941a67be4ae186f75c88a1ee17f561ca5b9feac3564222b50d2dc77a701658a8a8eef40f650900a535fab769d02b4c97642cdb1d86cdcc9f015f2b15c82f45a49b6e9d9eba36e652460f25137cc68f37f762c7ed7acb09e4fae7a6697acd29c80e050298ec47ed09f893749d462d2b50f86ed46fefcb7cef8026f201e8a04b43b6d0d82153", 0xb5}, {&(0x7f0000000440)="27cc12acdc762b16", 0x8}, {&(0x7f0000000480)="ddbf4b05917af1f59811dcf113351f4d6b66932c17214ac6b163532c63d73fb741897fb487e9aa2f72fa3a8473572586953a96e842f4085b45fcf4d236cef1b78361435343bfa54079d79dae2862e8a76d6acb82f89ca4491ae749fd62d7b4895f1732da8ea90c54c14cbc1acd8755e757fb107c8587a579f1329db9c9065fc64ea3c8cf7030c4f0c459", 0x8a}, {&(0x7f0000000540)="28abe8a9cf545fc41e9751833102bf6977fa97be", 0x14}], 0x8, 0x0, 0x0, 0x4800}, {0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000005c0)="d24a53c70fc41a238e5c5341de1e5151cefb85fbff7b3f64dc37847718edebbad3a6b1b262d85925a406595d6d5af0b43fa321ae1096521797974157d949c1a80864db96c5b386f1cf846eba44903b7a7e770bf633cc5199cd19300e08f419a9749b69b0ec25378103f91b79c5f939415eeb7650900266e7544f86236cf2f60d646dcc4e4ed659f29884e3556076148c7214467e925dad06a6f214249e95051135c89a9163e4aaa267fd2a0e151fc7845ba8cef47a7002cf6f60", 0xba}, {&(0x7f0000000680)="b58e4f01b3c0589c3a0de3bf3c732232dffd3fe145c56f1e15426353867c3f454111078459b76f3b7a74814c6d6b03006bc9a8f069f9009f7d3754e09eab326b8a323a2164ded3bf2197112db032fd74ccba3eff88b1b13231aad2380a6b94b4b103e2e6e8624346e00136c064d8738e0e4eb51673907508a4fa0e32d1cdd3cd83b3985d2e9731141997f84c924fab270596580c3440f81d938025f32eaf848273d6df16ec14a9b069b2a4dfdc3f448ace8451a0d662562bb72f1b7beba085f49322014f64ed0f3dd8ef6fe0e8c4246a991d4606d3423c3e19534972be77e53d00c2574242ec67d1dcb5b62e7204c00015c01b1162537850ae", 0xf9}, {&(0x7f0000000780)="58f3c320f211dbb97bf63a5b0e9d19f0ba278a124de1f126416b01e2", 0x1c}], 0x3, &(0x7f0000000800)=[@op={0x10, 0x117, 0x3, 0x1}, @iv={0x1010, 0x117, 0x2, 0x1000, "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"}, @iv={0xec, 0x117, 0x2, 0xda, "60bc67e9d1a4eb1b708034120e2936db05506d4852f5dcfdcfd1371886a71c7f390156ba72067ad31ff20a7e3e9a0b6bd8c9a42016fd7c61c40bc62caf2791ed242bc16439c7a1cc4d383155266a1334704ec3088db5536b7ac8784a3600b2fa394261fd917532fa1cd1067db707a8c1040797abd6662e9f5b1b97501be66e6cbaa31a851948e8dd34d48ce8a7c59f1decf78b90dd26e24146aec9a144fc7e6509ad367c760b81d9d107319d4cedfba19b5d9aebc8e3e304609e70f1e88260410762f66ead60295def5c19ae0a189edb04b7b65062554b40c1f3"}, @assoc={0x10, 0x117, 0x4, 0x5}, @iv={0x94, 0x117, 0x2, 0x84, "21aa7b0af9b55f255c5c6021026a60adeea641aa110c6c3b328271bb5ac1f969a3b52d9d8f6c503ac0028d057634ca55d636f67d18853d71b7fc302e03d65f186ce8060889e6e4009f3e85c273cd4a9dfafda2d93780125f9d2fc9fa8bdf1c73cc181e9097ab0a5522aa77dc0b82e8a72304d1dc69a9214daa63633381b1276503a2dc92"}, @iv={0x54, 0x117, 0x2, 0x41, "54e059288c9f8871769481b0431bee699761fec64177c639937f19f7f3395a22966a7b852aa7dcbc5b88bc2ed748258de12221a11c4fbfd1c765659f683c05b4de"}, @op={0x10, 0x117, 0x3, 0x1}], 0x1214, 0x40000}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001a40)="6441eefb9b8a5444027378bbc43287db9f524feeede4f4ad8c396812923fd3e306c001627ada7ac4b11b24249655e14576ff4e711990492ccae8deb76088951c7045bf1d26aed381563ea17308d94e9473e0b8e3c0aeddb763640394c7a6e24825da92881a757f06fc4ee9a43a3a81b5605da15459fe4d57bb06d9e2fd6c2dd4aa817f7b4bb2877a7296", 0x8a}], 0x1, &(0x7f0000001b40)=[@iv={0x40, 0x117, 0x2, 0x2d, "c5bc1c2fee26021cefa7d7bbfe63adf7c673b66b3f4f90f5a8bdf8da2a555fb88d9a0f860194ad5697b88f7102"}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0x2}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0xfa}], 0x80, 0x4054}, {0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="7dc0c284cfa496", 0x7}, {&(0x7f0000001c00)="488cb450bf0d95d0f21bf2d4b7ce2d2836d0f417e5ff02db65e1c488a0b7681175920c02f20233362baa3113d3d75b82a2c20ebf0992", 0x36}, {&(0x7f0000001c40)="f575179ce71f287ba8a6deee5905", 0xe}, {&(0x7f0000001c80)="945d6bd360f62641f565581e4f0cbf384cc2afbe9126e20a6be65b7bc0999c653a43011179ca3717d421c046b61c8b178cc2f2f1e054ed61c4b59640d0c5e15b478faa9812c2541064fe44d87aa9c961b4bc390859c88df5acebdf293a58c82484a225e0a9782ae91f7d159891dc30b97f1327f6bf653bfd3ca881c015858672c043354be25190e790716e9f6e7cb45e209f7472a2b6f1297413567584c6d3e0c0ab289a7ea3df9a24b2c9c35df6d326ae1e5f5387933bf6ae9900732a81919fee79c5e309229a7c0d6577251137ac84bd24150bae8751c26f7c895b94848ba8fdb3f2381967d8b609d33c", 0xeb}], 0x4, &(0x7f0000001dc0)=[@op={0x10, 0x117, 0x3, 0x1}, @iv={0x18, 0x117, 0x2, 0x8, "cd69ea7b651bc498"}, @op={0x10, 0x117, 0x3, 0x1}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x5}, @iv={0x100, 0x117, 0x2, 0xee, "b20636f2bb9e4dbc3224447c1c8a23f86682e5d0059b0fddf6073498546a8966c30ea43a63a9c47f9f5432c4c35bad62273071ba9577fd806c25ff795738535ed617d421a674b1406c1cc29e7639d2b5ca128efcbbaf06c6f7abfe2f3eeb0aa1033dc375494095bc14dbced8088b158fc5c2f6401c81d55b657d6fcd97b2ed89e4ca6dedc538ba38039de1a0766073a8f05e09fdfe38699964221d53ab699bb753a0f0c679e67afd6a1dc3017f59aead19d84f0420294e97c8a41b43c1af348b94670cd368ce65142f278d78158797cf4706528c9b0cb5bf3894664eb900ab6459631a3b1764a073e2f11e2d5c79"}, @iv={0x48, 0x117, 0x2, 0x35, "f1f925dd486889d4f963b452cd7de7b6734486b186fc95df683f720a012c5cd4b20811579d63d55de98d55f1ae9726eb69b51bfbaf"}, @assoc={0x10, 0x117, 0x4, 0x80000000}, @assoc={0x10, 0x117, 0x4, 0x6}], 0x1c0, 0x40}, {0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000001f80)="735a3f6b028c518135db12800b5aec4086f6a0992db9b7f467e1e1dfc074f02aade88081a5b91046d2279921e94ac80824c96656bf2c6149f4e00060cc57af05bb22c66950cb260692bc2177c96406fd8f3221a816eccdbc4416b627ec76710bf6aa2e6c0d5f88199961c523bc0cbe45cb967d948818cceb32cdf633658e2560dc283c7c96562edaeed58b92ea92cc14866dd3a93fa5f934d58887c6ef0488a1c944693efcaa26bd8b18607ccc61e7d3120a2d54245d2d1cc0100e3d13bfd33579b2685227b8e5a91c7ab67d36e24fb702864fcedae35fdc857b32354320aaea17c6c4cd70a9e530478c9d009a17c89503f42ea8b76b6371eb0248199458581b0f3abe087f63c5d570daa72e97ba809a90b423d663683b0740a1e5d3a8a56c3514b72fe488e0bfede722802e9bf29834a7c973a4790c3bf516d7c3a9fee051fca17833efbc833b06845889c5e06cabe1ca7f7d74cb77fb97c028331ff8358a0677e76b7506ec04a2deeb8a6867589334aa6de30121d87117165411cceab3b7bc740a8188368c568f617b0d8cf07a69f439e4b4520c5c18241a0a5661ee500f3ce11e1fc132236f67219bc042fff2a2694240a5dde7ec092fba8950c91631830526be73c80c77fe1ee23af6893b7ddc9636f80b16ff419035ad3ca40514ff866bfac43583596f4b6bafed4a974a734838622c4e5b9cb8b038bde39953bfd2ab2ee3bdf5d90c10cf7dac0367e98d764977496bb3deedb555befa4e230fb76bb4e44fe381a1be1adb808df127e268870daca71eb85b415c93c7ff3ec0e404f8dc268a98780bca6575f110118790cbb0adb4b3dd8fac392dd85115cdb1a8a1fdf31f3c09eb7f001df83173d3a93e7ae47511fc1881992ebee16b84bfca4bdc5883411c2bee88ba321e443eaf76fb17b2bcdb85da6041b497d64a7062dcdae39f7f2516ff4d041d3362abe03c821fc5f44e9f6e03c636ae00e0b47ed7c2adb971fe981370acb23c7005a29080ad0dd5d4774f9ba453fce0d86330ebd96d5c1861deb9bf7375a26c2e1b7f0a38cf8f97e1130dd8ce6e752953a321f437b4399cd215117ccc6b4a05c2753b501d5f66b4a7a5be38101219373a2d908ebb417aa961acc329b1bedb96d35e7139b1cc59f20722b66b9eb25b851ef661fbbf276b02137224726beb2905268dda549c3f5afbcc8ddf1bb84030762dd661f4592b1ce824ccbcef72e50e0ffe03492bbcfb4862229784d35fe04ee83c2438d259a652e3e6198ac82cfd0a79edabc88e04ee663d748d2a0a90cf6894f628351c015875db68ae5e54b9ca1dc4ef9e5aa2f927bc468f8149a59474197b19ca23d3145c7a5550fbc687da79cd23b2a2bea0083f2a064ca5a805f771ce8bad871cf7a24d97c18d90eb591d2c89883668c4acf8655dd68255179d73c582fe85523689619abee0a71ef52cf88fa09898bac4bcb579b32b3e3c575121a953360ef130c5a1e7759837accc7cabd81e9135580fca85457df886f8e3bb35c8be1c27090caeddb7e15878721d7ba0220bcbd089a54f465771df4a4cd451c1c788e1b55f4abdeeeffe2da6fb719c10914c4145ab83655b43b992329b1528a350d3c465bcfe984eccb3b41707e76854019e69c4bcb229fa3b0fd9f193c1a880873e670cb5aa074ee8f35f199b17c3839b9acd0ae83947a4912425881d623be365034a9d40b32853a2c9b93aaebd5391147437734b3ef77d52d65ecb61f8de0973a88b051e267e6b531b828a8dc2d3f47f2b01aaf1c6cb6d9d64497d6916c6b95ee1215e80d82688d349fd56a86c17eb77e3b5613033730b8160b32e478df9f22f3da0784d389b7e63322529d750c7fed4e6c33cb082b172aebd4a0f864871d0a7b9f6f46644e837e25ddfd63fb75631d735ec37a614457d6d4fc26c864bebe9164b5f6ef17edc037ff343f45cc8a1bd0bcc4a57f1af671d54a3a5d3653481ae29c8866ed63a3fa6d5ec1b3ff5c4c7e67ee7a722d7f5b064a8bebad7cd73851ab086bd5f25b87150663e234c16052d94a98c65f4e70a4747a9e3c0ecf9b6cf03b312c8a36cdc9273c07a48f1450cd421f275014ee76c6f239c05ec51bf821d33e0fcb15bab1e979ecf36bd78552a24db13ec9537ceac2b6dd291900fb49852a25c142229df0ec724e278cdf8dcbecf90d623d1c0b923d24e441ad87ea04d018b05f3fd80850447cf86d6b0aef4ce6772c053f04337ee41dba9697ecad2dd4738cd60934b58a724fe096f4adbfbe0659d5a30ef5eb9123d4d94b8e035eddd2b1cb3d6ba3f6e3075df3c4df6e161b2437b89aee41a32ad3356b7ab32804badea4b1042da3c88b6504e93eddb529fe1df5accbafedf7da0bf8424cd721322b1f98fa59a0eb02e85d3674501372df54914a7267b56470574fec9c145886f2168c6f41c8b42c43ea4f83745d68abc5e95c76050f4587327d137d52d53ace4076daf25f4b6dabe4c7fbb3cd7511cf43827d61ed249c06d0dd518d2ada928503afdaaac197bf94be2d6fb136031ab2c26771bee3d291e0a6226b259490801ea5a18a2359421c01173e1777418fe54873cf3de15003c6648be7c829aa5e4a112a6d2d8da1a4c590e6ab55995f62bf30c8ca6d1c664ce0a85112415c16353edb4f1c199c47f7b8e7037e09a1097910f88a104c9a2006938eb73e13cf63fef7b3d6e5aa573b92a273153ce2c9788dcd509d012acbe31d47e8bbf3929ff0cddfc629a11b28713c3af642366d7a2e203a4b1cb78e3d1c591d2b5c4730340b7086dbe78e1332af285e948c5e2787ebd0539e538c225d2c167e23373a6c24ddaebaaeff0df44f029d7622eae66780dc24892a1a8cf542e0c9cd9b1b4fce464fa9228ea67be4186a590a8e6257f267f10d1f53e56679254397e6fe055291da5f7211ea4e2f67bce0005cd8be7f59972d392f946f72f3994aa966fa77ee305137a054f14095927be12b1981266551a51d1625df73ccaadecc7b08427bb95232b27873ba8a4df482dda87f8e993d949f73a304cca72c15170e8503b4894092fdf2a7010afd5a290ce95fee9bdf0bab0c2cdef9d700cd5cd66c6a96d5f2095a9d60007a7a7e6174b7a1fc520d733e337336f56b8f74200af0cb70322687760b46c5ac238918ff69596a780d040e63a523f8dade9cf70bc5cbdd8d79f1cf6f9382f29ef868493220d36149ca36aeac4f5553ab63d4ad1cf3a11ab27b6e0ce6eea9ddb345cb453a25ff9c81a4c073787642a6532bf1d347c666701fcd7ae5a2449e7c4994116a61d5caee07b42ae854d60637c81dd7c3aaa57cbc25979f45c1fcac6c57f7601b3a7542e4b8554bc273a1fdd6596fa883ce078fa08d31ea5e77f28c8faf9b297f5e776c767c1fb66feb6a9835cd2b3621fc0cd8556f9915a10463292ff3b1ba6e214f6e592a862af2a0b7e47dd7ff74ca3b4b8900bfc47a73a725555a76e024342e4b0e7b220b8d814792ba002f413334db7deb048294a32fb48a59b865d0aaab8dcc52e884674594911714bfe6a4ada9658999500e06b44222231912e09eb5829162f16e70008f2eb2390c10cfef956973fe13f0b932863a413c401323619d85b83574dd55b8cda46a610cda07fe6272d3674248a9bd0117b3ac71b33d3f037fe67a659edeb449c90d3a206edfd7e79d9ccef1e15c3afb655479a3b4e2671cd5c7f9b80a32587275bd52c8d0f57211fd007d560ca243708b80b9e1a6f8d8162467e661d8ab0b944250efe389aef3809ff873caf45d7a251901b5ca0a57b7696599b8ece8b2484794faab80525f98113d61ca9a17c0150e192301ff84d2d9301a6ca73cb42a40eaefc55c326b805663f0ef0d078983647736e37a552273d9cb81396e5b9374113de0b4540e0cbd2277d6b0a4dad7ec48f086378f19bbb0f19207d26272f94e99e5cffd2e5fe81cc79f82ef67cf6c0555f288894f991c8b3a5df6ee3b901042b6a5b47db463458eb2e5bd80a900f51f7c4033bfa126b8fd911751dc2cd1ba45bdcb64ccd7a55c91ca261f45b247f308d073b96c902ccf67382119ce60304bab92e997b4a9dd4f28b70439d969046a85a055695457208c26b0c74c22f019e7b172c6e8f1c35044c2eabb5deade66819615e14696ef6c3d2db06de265c351c2b8786289ef17fd82282f7b040b06751270418e1981a717e859bfb35ba2a4bf527d0be781bb20d848f47b5cfe11ec47b9e6049f62d251ebe206a9c5b2684b73839949d452a17bb0224dba0bc78e01c3cb2c99b24243ed7401be7790a9162f0df56e173b913e1c0ce1ab35bbcd435b7332bdb90d8cf54288d6d8310bcdddede2f16782d74a2b335fb85dce6f3974c93022a4f5d66a4ec76cd916395e6389d381855c5510d15ac4611d5d9b3a7ceb758cdfc109ffed97d5fa85fb475cc7723720b7f397ff25e278a0ecaefca1a517e260e98e21cd2ac3f4ccf0b0b63ccc6f4e366a234344cfca5131388a89239aa36548b394b29a7a9573769d83d66aa1c8406d3535efeefe70c74e3c05154dfab167a4bdfda3edb6f392dcdfe9450532fdb300a76af2b73b6c5a781d6a6bbcc3d908b161a5fd97683bacc7c1210a9fc4d483b4f2c58a56f052c5eb9ad58739ce26234fd0fdbe52d6186b8607d9b71f95707afa7603742ebcedd44fc3a9cfa4f273b046ce1a6c205e932da0dfbaeb501874801f9d73a898d2e937be092d3c31eadad5677665eec9bac48055d392295fa897c06cb433e2e69abe5cc429fb9e001f0864ab7dce4ceb48606480220eef930cef5e6ecb69a6d9ed0be7be175d9ada3c3f31a3261df61088757b853c170cf39fe0b7f2a39023e63adf373a4bb39673cd65603355d663870470f10a2ed991eb0fb7752f8e71601757523ad00857b9e5a05400436605a9994b8ead86b574363f1c6ae1a34040d73b9260d0d1f596fd7ede9c022d9657c06c0b929cd6aece21b7dfc3e2f062d46ce6993b9bf19abbdc587a933b055b08a6d0fddfbef3094b3379af9187f5f859603841fe05fdae3744bb1a9bf58d7ab7918da06405bc99835d2b57a72302b3c9f1edeb7f7b76954b17e97204cc4a05a2131b7b24d519b4b2f2ee9a365e68f0b03a417b3684a2a38d9de0edaa6b9b894df6253a88325e82919c47263e066a0994f9ee19646d463b57cabce66852812c747733cf3f94ce96485968a81a22331ab8f5404bbbd533e30a8646786910ea97a9769e25024c00507501fa0d90f6f59faae744d1d8d21e57ca041ec6854454e098714dbf2d4cc0cb5fb47167e784c846fe04df7bc42f9a35a225eb56fecbcb21721df20f873dd192abd3b9ee2cd26c40d99c80366cc3d55127f1bc6b450ca695256ee77c1cb2297561168e10caf0703b4af7a551b52deb082e993e2b073635e39c37273bd4cae5e6e33c87b8ddac9cf87d7eccfa0aec1327054010f4606884a8a1616a2988473c979feadcbdf5c9bf0f8009036e31006fff3bfcc114cd762f66bf131069e6bc9c7c5aad336158a4d19f0d7cb3130ec805f852469ebad674d48475b5588147053d0116a7e3317687e004c51d4a2d06ed9dfbc27a34338d819898f982b004cc01a8c60c5a2eee38c5c51e7a80115c81d6760bfe852102624c74b3ec863fa54658f42d476d10fe24e41fce97626e5996eb542e6639e0a0a99aaad63d1e8d44f7496bb142a5b5cc0ee17f6b555858d136c18985292f912f5e602842b460a0f13766f2aef3130173e0648b27f53cc639b6ecca812f56c6e2110e6675e4d43323ff4bd36f4e5da5991cba8686cad7c9880cb6b08cd4521b13caf", 0x1000}, {&(0x7f0000002f80)="8d97a6f86d18ae148bd1fd4d750cb690597faa5c579d1f873e8556ff8fb14c7b660f6d31d2419ab32b59c529cb36e88c6e7550e7fd46ac3c115c7df56e61f99208b1d1728cb6199557d9e4", 0x4b}, {&(0x7f0000003000)="89e766390d7fcbdaa8818f019e7fdb08d9217e0887ef210a240feb1146a91e68258c34afde6897ea53663fd37d949d45f1314afba999ed059079835ab5f18cc5609bdcaafa4028c844be804438940b6009435cb219dee6571ac77ced20ad2dca563cb7d6a392a2b3c6637891e1eece98918e1f38d6b2d4721fe87232d3216440fc339f94279c345bebcb301e986b8355523993", 0x93}, {&(0x7f00000030c0)="687b82a35a0bebe66d945648ab45ff7539981859529a4a454e7ebf8a4bce750c5de496c509e3037e6374c1c81490fd7336c32b2d3051854d", 0x38}, {&(0x7f0000003100)="0d7fd040757feff330ef1f9206069365fbf5bb2bc01083c384460d09388d2a70abfee2329d955bb4e0058ce957bf3de9d07fd7528033be276d96661feae6271e9ffe08d291f29453a62f5be1fa1bcb01d9b1b4eb98f520fee3dbfc5e1e0c", 0x5e}], 0x5, &(0x7f00000031c0)=[@op={0x10, 0x117, 0x3, 0x1}, @op={0x10}], 0x20, 0x2400c841}, {0x0, 0x0, &(0x7f00000045c0)=[{&(0x7f0000003200)}, {&(0x7f0000003240)="bcf065be6b94f9daaf3cb35c", 0xc}, {&(0x7f0000003280)="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", 0x1000}, {&(0x7f0000004280)="a8122f5a2f1f9ad645db3cfa9709801d97d625ca0a3bbc39b0a40d08316752c8809625ac434bb7bc6fb8a32e3c6af574f11a4dc1904aada504f6ee36f46d410d78b8e7622dde0020d52e6ec0c38370f6983e9c35d11265b9af5ecd094a66f72bb70a91003a338ea06bbc0e0d7fce353b58be22cf0d4469e7c9311c893f220f952afdf35e46be21d74c056a9eea2a161cea52bfea739068515c1e46eb600d93ebc8078dd8ab65b571cb8bc863336ddc", 0xaf}, {&(0x7f0000004340)="a57ee57414b1e5d3eee5b294d508abb290", 0x11}, {&(0x7f0000004380)="153304f85c5408eec020acc0dd827ba4d38713324ad5ecb169aa982bb227766c6aa015eb623fb034c6f555cdba5d2cdd4a6e2f35cdd09929be44605662ad55fa36beb13d6b37a17d976458000a35b01d8c7cc7041541764cb835810e1e4caa17255523894609", 0x66}, {&(0x7f0000004400)="87d78900819abbeb0535dae412a06ef8bdb9c503132c10e5c61e672247dfad488b68eac1cc3a6ad2f704a4ca215cff0cd6fef1a2e97d2c06e6d2295581b34180cf0ce4b3ee175e19d9dfbf41f0a2309316fc38e0cf0a3e10ca9450551f8ab90e8b65ff75014cea3921254668f53ee99fff59fcea55d2a8d28d10ddf7671510e6fcb882fe9dc145566ba24d1705617bfdb51074f9c2d100", 0x97}, {&(0x7f00000044c0)="9f7f63af89b4c2cb9de8cfff6951641dd87465e1cdd170b152a8e23a38d6bbc5f3e460e8a95730367308b72bb13cdf77f47392a30edccdd778fd8951e48f5fe1b8110465e0463df7ce9b265aebe43f09fe178e887cb80b943076b6f0ac1358d350f17626dabde1c3fc3b61e3777bfd8f6e38dc989491663990763944da0b05b6b7f553b97d95db7c2bdca1300b35192f1fbd681c3b5cf09e9844f0ebd44017d3419f622bdc1ca4ad24bbad243966b68adf3287", 0xb3}, {&(0x7f0000004580)="00653191f739cf1a8991", 0xa}], 0x9, &(0x7f0000004640), 0x0, 0x80}, {0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000004680)="1ab7e415c18286498cccc687434c61a3e04d0b0e4f94062b79afdf383df631bc68376181ebdee741cd0d3b9e074a8238d04fe5c227b15a96d497b75573334407063be81f90d028be86bf1edfbfbffb2f8e20419e6988775e90f7eabcc3713c1b72a28933da0cde446d7c942038c44bb41c", 0x71}, {&(0x7f0000004700)="6b4057a6007fac", 0x7}, {&(0x7f0000004740)="f6e2fd65967532d09ec4983ae9f1f0875dd18c701fe9386553207d489d64cb71b2f15ac333278b1d26de279085550d7624b1cd4e1791e8f1ade9105e89e733f4eea3168f483b3a84878e7c77c1f531ded9319b66c9e6569b565fe5b49fb4f1a8cdf40e7851081ce88315aee3129eb3cb7065c44a8f8940d1e8ab767f", 0x7c}], 0x3, 0x0, 0x0, 0x40}, {0x0, 0x0, &(0x7f0000006b00)=[{&(0x7f0000004800)="4f6375958eec53555e4b345e2681ff7e037ce4c966f7d5582e7105199c0db2440fb319b6622a8686de29dfdfaee86f1d33ab405f9b834edc4882bb389a96ea28c48168a2fdc768aeb48e54024e4617067c70e5efb377954b83de35c1481ac74267e4d27db5472ff643b8aec70fc3452f9a10d173f35554794da336610df9734cc6558246b921fd35bd61d83fc8e353c54a14b1344d4d4cfcb58fd9575d3bded43dc1accb35ee4eb84fb67454ec29307ef91a6f7d0f877fc0bbc9152d4f62092d8f855b8451f7ed2b615f317d3f88a6ee2af44c88", 0xd4}, {&(0x7f0000004900)="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", 0x1000}, {&(0x7f0000005900)="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", 0x1000}, {&(0x7f0000006900)="a2e2941717bd3ae14bf9c5ba6167fb1737489fde1a2354f10e67cd5f0bbb2c3ce8558dde87d8005fc1d670e4db9ff8eedfe88dbf3ce81cbf650b80ff39b3b2f4784129b8ffe13ce8ee4ab130651682cf65b90073f0188ad443c3aabab1a538312f3aef8229ada9ee96c709773d25b2e7498cb3facbaa7bb04dd5353a6d344bf3b2d64dc7f0915197bdef7ed5089b5b", 0x8f}, {&(0x7f00000069c0)="63698333d4bcde4333c251f4653bb9bfec6e146f09ca252fe247a7dfc19471039a93a54d880c2479e5bcbcfe84e4d05a69ed8b989c10df1e58", 0x39}, {&(0x7f0000006a00)="3ca09a9efca75f7209d7d7f763e92c0353c0fbd277bc83dbfa557e6fe69f088e9916fea77290a60ca998319b99e90a5edf96b2468e05085d9dc90fb88957ebc066e0691a48f8cff9e3dba5d9672b20b0d31ed8b21c627e18052a06530c3fdae3dcf8b8ea4b3b440c3155645ea2bbf86ae99d0dcac03a14b68b2d19477e013732ec612c3fb6ebff465ae242183f4d2293fa4037a0ecaaa05d806f29bd96c2948bd2af347c9c7c9da30320a1db30da2e73c16f95a887fb1e49af487f81595b2270e6cdd4f9d0effeb8600e45b371eb9905cabe169ee0937623844a", 0xda}], 0x6, &(0x7f0000006b40)=[@iv={0x1010, 0x117, 0x2, 0x1000, "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"}, @assoc={0x10, 0x117, 0x4, 0x5}, @iv={0xf8, 0x117, 0x2, 0xe7, "4cc3d99f7d1d7b60912c65c59367efb1018230cd3744f20ea31dc6176c99629abd27462811b7d2e475299e6d7760cea0fc7c6f3de5acb6845f32b4fc63e61c393ac10abf14f663d56ba3d02a31a12af61b3701629f8205cd76329e24e7979b04669c2bcb06bfb0c9c60472f802822b1b7abe8ce92706caa670490d81b28044b0948983414a81c6a1d777966978d3369c582864aad229f5cc5955d1b7b64f95782329808e81be8f3282e5f864146c4d9fbe5e513f1ab7b70fd94a82d9b1abaa159ab9ab8869bcac9a8228388c3e10645209315eaf6921ee5b12972d482ad51faa802717a0f2b425"}, @op={0x10}, @iv={0xb0, 0x117, 0x2, 0x9e, "1b0ae9cbdb0fc56c835e44822613593a6aaf62243cba6f235a67e48e01ce97eae35b70bbbfa947cc3be5947e186614560b639fa795fd8e114915ef135642ccb4974994134e9b33ca1ef1df732114043cec6afc7e22a6f41011f97cb64bfcc78d668b772505ccb81aa2e0d990b1cb1720c0c55f93a304eb652084b81cb3ac67ae5535940abd9e48106451974e73ea1cf6d23d64a128be42b6f55b240986f8"}, @assoc={0x10, 0x117, 0x4, 0x9}, @iv={0x40, 0x117, 0x2, 0x30, "3c5e7e855ff38c00eada3cb8e176f1b36414ed0862ccda2a99436a528cba715b8fa9d4642c1ae44a8e5213a35e88fcf1"}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0x1c, 0x117, 0x2, 0xc, "b345c35dd1a6ea4f51af4efa"}], 0x1254, 0x10}, {0x0, 0x0, &(0x7f0000008080)=[{&(0x7f0000007dc0)="eb2f6958dd051ce836d04892db8c2fc5665142344cc42e6bcbf13bd3c9eab746672d2bb648b38334c637ca65541c8c47b9123366e88d8fa24d78e3b963c3dcc06efed174f87d1ef5333ae628df3cb6747b35df8df6515a3ee8ca22cd7b1be04f8367f99b1085cd78afe905ada598be5bb446cc9045ee2275b24f51c482ea337a330c3e56453206d1c1489060da49dd74c4a17e331f45ca48125dda32ce551af4", 0xa0}, {&(0x7f0000007e80)="bcea4beb96ceb9d3df0e6af93a548dd905e9dfa28678bc3b9056269f33e929301dbda215d058efe3d8903569e1643a00f0c2c23548", 0x35}, {&(0x7f0000007ec0)="85781a3f739b689f13e7cdb96d8d61ea7223f761250b7c3cde375cc70050affa0056350c6535493d53c824e5ea528aa31bd4ce66e6f94100200e2c9a950c5f50d7139a1b62484c4aa649b812ce2a2a427bed80a2c71fb2af0468f45e99ce7fe353cf10c826c9e14abfa5f8f2e2ac7fd7932285b138d3062b199fcd9cc8755b52861b9362fdd02b0ca4a4956d6428b3a63192e89e3f93068e0cf54bef7ddbd426bf1dc8f2264042489b2730d27de56e0efa0b4f26180fb224", 0xb8}, {&(0x7f0000007f80)="3e6a7069dd8eefec92f364d7f7c0ffd4dd14dd26ab766699730bd44d9c4ac0273855934ddc79d31f7bf2b70bd8d5cc77452efd9dc2084870c8800d7adafb35dd62da30eb93e8c3f655ee9a80eead5870176adcdcac56cd897f900beadc8a2fde9ff7d12e8aa8b4daedbd4a140235658499c23020f02b3db4b391c528d53d3ea3619dccc87c567fe8bc6f48c61b2bb95297ed21c6d1ac66bd6f808e62", 0x9c}, {&(0x7f0000008040)="9bcbb62cb32634126c1bd5f57c378b87b8af84108e8b9698926e9acdb3319b6ef3f254211c807c053b259d683c5e091ebbb5d299bd", 0x35}], 0x5, 0x0, 0x0, 0x4000}], 0xa, 0x54) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:33 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x921, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:33 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x922, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x900, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x28) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) io_setup(0x6, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) io_getevents(r2, 0xe37, 0x1, &(0x7f0000000340)=[{}], &(0x7f00000003c0)={r3, r4+10000000}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000180)="bde70f9516e1271c21899172a45692bccaa6610e284364ee125912c5defff3279147e8f773cde9acd08da0e73f98fb8112927b2f39849b1ec4eeecf77d4f6145f27cebfc8c4bd0202e3bae2423c14b6e31a16b1a8f19b40df223b82ac7b60f7babe77d590a41a6c7d61a746db1a40d9912", &(0x7f0000000200)="4b231aec14080a117f6cb14652dde89dbaf64692e05374b98dafa10d8ce9ca20aa48b6ddedee9a69ddd94c4ac7a5300ae82e751862ef08591817254a2b7492265231", 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x1, &(0x7f0000000400)=@raw=[@alu={0x7, 0x3ff, 0x0, 0xb, 0x0, 0xc, 0xfffffffffffffff0}], &(0x7f0000000440)='syzkaller\x00', 0xd4d7, 0x50, &(0x7f0000000480)=""/80, 0x41100, 0x1, [], 0x0, 0xb}, 0x48) 19:14:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:34 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x923, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0xffffffffffffffbb) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x3c, r2, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:14:35 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x924, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'skcipher\x00'}], 0xa, "8d1ee1b88ea0cc4d23f9e664593608ae4174f9b71b5df51895f27b6f422ea5a520976403e2d865a198f60f4e04597645893019d346353bf5c4b9a5f701e7da87a2bfda241931dc3b5567c0f38010e9202436cc967f37bcccb847459d21f2aa0d5b1bb73e06db6ae5fa9416bfcea773880395fbbe37ae3b04462eef43dd31cddf89ccf1e10c9507caf0a84add7aa222dcc12e929bfa3e9e8dbe1fa3411b70bb9b204961861c0d881ef94c1982a090eac4bb25eff8a9f6f244988e50"}, 0xd0) 19:14:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:35 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x925, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x81) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) [ 2350.844902] IPVS: ftp: loaded support on port[0] = 21 19:14:36 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x926, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = accept4(r0, &(0x7f0000000180)=@hci, &(0x7f0000000040)=0x80, 0x80000) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)=0x3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000200)={0x3, 0x3b, "d2883a5b7c0055427bc9fd919055d16b89a97e1df1b3134b289911db7f5aae68a7a1082785b39cd881055a37844dd44d5ca1ef42976a7a5f91df4c"}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000240)=0x9e73, 0x2) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:36 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000380)={0xf, {0x3, 0x2a8a, 0xa00000000, 0xfff}}) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:14:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:36 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x927, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:36 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x928, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x3, 0x2) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() fchownat(r2, &(0x7f0000000380)='./file0\x00', r3, r4, 0x1100) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000300)={0x0, {0x401, 0x7, 0x7fffffff, 0x8}, {0x0, 0x7ff, 0x3, 0x7}, {0x3, 0x3}}) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200080}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r6, 0x403, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x24048085}, 0x8001) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, 0x0) 19:14:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet(0x2, 0x80000, 0x80000001) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x975, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(xts-camellia-aesni,nhpoly1305-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000180)) 19:14:37 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x929, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0xfffffffffffffe8e) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x111000, 0x0) read$alg(r1, &(0x7f0000000200)=""/145, 0x91) 19:14:38 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x92a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:14:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:38 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x92b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x0, 0xf4, 0xf4, 0xf4, 0xf4, 0x1fc, 0x1fc, 0x1fc, 0x1fc, 0x1fc, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xf4}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x9, 0x6, [0x38, 0x40, 0xf, 0x19, 0x38, 0x39, 0x10, 0x21, 0x9, 0x35, 0x5, 0x3d, 0x2f, 0x3e, 0xa, 0x37], 0x2, 0xffffffff, 0x7fff}}}, {{@ip={@rand_addr=0x6a, @loopback, 0xffffffff, 0xffffff00, 'sit0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x29, 0x3, 0x20}, 0x0, 0xe8, 0x108, 0x0, {}, [@common=@inet=@set3={0x50, 'set\x00', 0x3, {{0x4, 0x8001, 0x1}, {0xf7}, {0x6}, 0x30}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2ec) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 2353.667827] IPVS: ftp: loaded support on port[0] = 21 19:14:38 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x92c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:39 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x90200, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x2000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0xffff, 0x6, 0x2, @local, 'vlan0\x00'}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x8, 0x8, &(0x7f0000000580)="559f83257c18f00976c59229d3d8ec56e981153ef378e83e8d95999407cdacf97df1da30c173231559a6401be87d695cf51aab911fbf972206bc49e1de2eea1012c3dcf9924434a5ac3f6ffbc6a875704ec1de32376422d0126bab83654bf4ff9d4c993040c441414c1544df4c23aa9806521e03fccc3f5d9dc806dbd46f3bc8bd1a80f7415ecbac66398bf873d3a045027d5d20aaf8c94403112561d44858605548bbe0ec885c471efe", 0xaa) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:39 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x92d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:39 executing program 4: prctl$PR_SET_ENDIAN(0x14, 0x80000000000002) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101001, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:39 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x4200) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x2000) accept4(0xffffffffffffff9c, &(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000700)=0x80, 0x80000) sendto$inet(r0, &(0x7f0000000280)="2fc85d6affde2c167c49529840ce630006bd0be293951e4d0de939545a3056617c8fa48b548c47314ddbc29cd37836b620d96ecc503101d89e89273e195b9fc65a3b7e90183208649e084f339ad7a0aba7aa10dc9e0ef3f5f0b192101553c4f52132aa343d4cefa5ed973fcf4ece87944939672e0fcbba495ba39c787ccb933e62cde27658a72f5d173c2e84df38ceb9a0ba3c511559ba5897392574fce3f4871b77edce8c0793a6c198c3802be156be4a14cd5943f25be40a0f653af556b3fcd883c4b0d169c333d6c2f9cf19c3106c521c0075c8595cd35a4e8ddc798aa9734f", 0xe1, 0x8000, &(0x7f0000000380)={0x2, 0x4e21, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xe, 0xb, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x7bb15b24, 0xf, 0x9, 0x2, 0xfffffffffffffff0, 0x8}, @jmp={0x5, 0x2b06, 0xa, 0x7, 0xc, 0xffffffffffffffe0, 0x10}, @generic={0x792, 0x6, 0x1ff, 0x7, 0x8}, @map={0x18, 0x2, 0x1, 0x0, r0}, @alu={0x4, 0x7, 0xd, 0xf, 0x0, 0xfffffffffffffff0, 0xffffffffffffffff}, @jmp={0x5, 0x1000, 0x1, 0x3, 0x0, 0x1}, @generic={0x40, 0x100000000, 0x3, 0x1f, 0xc3f1}, @generic={0x7, 0x9, 0x7, 0x2, 0x40}, @map={0x18, 0x3, 0x1, 0x0, r1}], &(0x7f0000000240)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x1, [], r2, 0xf}, 0x48) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) 19:14:39 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x92e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:39 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="d31860fd6e88f54a4e94fc0a40a49e4ee01136708aa18254020954ec7c2fc78b04cad402fbbc1d1e50abc1a66696cffe977cfe1d2deb3b62fc32e51573bd06e7473a67030c96ff6fa6ba35ae4889d78517674d22d85b2f3ace105e90c6", 0x5d) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) tee(r0, r1, 0x3ff, 0x2) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:40 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x92f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:40 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000180)={0x1, 0x2}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000200)=0x4) 19:14:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000380)={0x2, 0x100}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000580)={@nfc_llcp={0x27, 0x0, 0x0, 0x1, 0x9, 0x4, "9fc1044cc850e2fc35073115312b171994df7b3dbc7bfdd8630ff9923cf42213041977df77e71369860d81a4e00b79b8255e831667bc4981af40be314f871e", 0x15}, {&(0x7f00000003c0)=""/5, 0x5}, &(0x7f00000004c0), 0x30}, 0x9c) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '/dev/amidi#\x00'}, 0x12) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000e00)={0x1000, 0x8001, 0xfffffffffffffaf7, "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"}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x4b8d, 0x200000) setsockopt$inet_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000400)=0x1, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x404000, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000200)) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000340)={{0xa, 0x4e21, 0x7, @loopback, 0x20}, {0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x23}, 0x7fffffff}, 0xb83, [0x4, 0x64, 0x4, 0x4, 0x4, 0x1, 0x9d, 0x2]}, 0x5c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockname$netlink(r2, &(0x7f0000000040), &(0x7f0000000180)=0xc) 19:14:41 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x930, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:41 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x931, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:41 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x20841, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000001c0)={0xb811, {{0xa, 0x4e24, 0x8, @empty, 0x4}}, {{0xa, 0x4e20, 0x8, @empty, 0x6}}}, 0x104) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x3) 19:14:41 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x932, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2356.545531] IPVS: ftp: loaded support on port[0] = 21 19:14:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:41 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x933, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000380)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xffffffff, 0x103200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) renameat(r2, &(0x7f00000003c0)='./file0\x00', r2, &(0x7f00000004c0)='./file0\x00') 19:14:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:44 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x934, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:14:44 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80, 0x80800) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x11, r1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x77359400}, {r3, r4+10000000}}, &(0x7f00000001c0)) openat$userio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/userio\x00', 0x80000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000440)={0x0, @remote, @empty}, &(0x7f0000000480)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=@gettfilter={0x44, 0x2e, 0x700, 0x70bd27, 0x25dfdbfd, {0x0, r5, {0xf, 0xc}, {0xffff, 0xf}, {0xfffb, 0x8}}, [{0x8, 0xb, 0x1ff}, {0x8}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0xc800) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x80000) 19:14:44 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x935, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:44 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x936, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2359.260418] IPVS: ftp: loaded support on port[0] = 21 19:14:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'cgroup'}, {}], 0xa, "142aa12c6a432e7585ffe8c29fbcf26ae4c767ec02b0139b927dfa225c4883fb99ac1dd87dbd162bfb97e4933990169aaed08654a2d620b1c4e557abcb9db050a85c659c419fcce34b1308037262c0e448e4f94161832227341d4cebd6573ddfb65906bdd371fe15108ced1d827f713ea84b7f1255712aab107ac167039c4118c8ffba197449565e987ace8b5917b63144c42dfb"}, 0xa7) 19:14:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x8, 0x4) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x20000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:46 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x937, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x74) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4d3, 0x40000) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)=0x8001) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0xd8, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x3, @loopback, 0xa4}, @in6={0xa, 0x4e22, 0x8000, @empty}, @in6={0xa, 0x4e22, 0x0, @rand_addr="340070a7bcc5aada1a76c93c58e987ad", 0x6}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0xb4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x10001}, @in6={0xa, 0x4e22, 0x84b, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, @in6={0xa, 0x4e21, 0x8, @mcast1, 0x3}]}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000300)={r2, 0x9, 0x9, 0x400, 0x4, 0xfffffffffffffe00}, 0x14) prctl$PR_GET_CHILD_SUBREAPER(0x25) 19:14:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:47 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x938, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x843bd8ba1006a2e5) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10001, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0x0, 0xffffffffffffffc0, 0x10000, 0xffffffffffffd543, 0x7, 0x8}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56eece51ab35c011142a91e586e697eb6a7158231c6e34a263720b4b7cedebc0b0836cb1858cd3d04d201e80deee6f237d8b8e390363f30b9d3"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f00000004c0)) getgroups(0x1, &(0x7f0000000500)=[r1]) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000140), 0x10) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)={0xe, 0x5, 0xfff, 0x1, 0x3, "8e7b4d"}, 0xf) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000100)={r3, 0x6, 0x100, r0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) 19:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x90000, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0x7fffffff, 0x7a0, 0xff, 0x4, 0x6, 0x5}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 19:14:47 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x939, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:47 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x93a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x3fb) [ 2362.219532] IPVS: ftp: loaded support on port[0] = 21 19:14:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:47 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x93b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x8, 0xf3d8a15b65c3362a) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x801) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000280)={0x2, r2}) sendmsg$key(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x2, 0x5, 0x8000, 0xf, 0xa, 0x0, 0x70bd27, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x1, 0x0, 0x2}, @sadb_address={0x3, 0x6, 0xff, 0x80, 0x0, @in={0x2, 0x4e20, @multicast1}}, @sadb_address={0x3, 0x7, 0xff, 0x20, 0x0, @in={0x2, 0x4e20, @empty}}]}, 0x50}}, 0x20000004) fcntl$addseals(r0, 0x409, 0xb) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffffe1, 0x8082) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000380)) getsockname$netlink(r3, &(0x7f0000000040), &(0x7f00000001c0)=0xc) 19:14:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x6c) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xfffffffffffffd10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:49 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x93c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:49 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20200, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xfffffffffffffffc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 19:14:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:14:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:50 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x93d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000180)) 19:14:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) [ 2364.871520] IPVS: ftp: loaded support on port[0] = 21 19:14:50 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x93e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:14:50 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="100000945c27df810000000500000000000000cf7618060000f34bd8a7676b53"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f97a2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80585414, &(0x7f0000000380)=""/126) 19:14:52 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x93f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x5, 0x4, 0x100000001, 0x0, r0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000002c0)}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) memfd_create(&(0x7f0000000000)='eth1md5sumvmnet1md5sum-\x00', 0x6) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) socket$inet(0x2, 0x1, 0x20000000084) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r5, r6, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r7, 0x40047703, 0xffffffbffffffffe) 19:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'batadv0\x00', 0x80000001}) accept4$alg(r0, 0x0, 0x0, 0x800) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:52 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x940, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:52 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x941, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2367.570966] IPVS: ftp: loaded support on port[0] = 21 19:14:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:14:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e700735330d6d60d930db7ea24c3b04403c0466413340f1ef90c583201bae3baf8236ecd08992a87115a98534fcf06b133d44c4bc763f5ba3787042f538bb63875546edb17a782eca3ee5fba9a742bd9f0827d24105f8d75bfcf53d8db17b9a8cbb99370abdc07e6e7f7b37611f39f73d048c1ac200aee45d1d2f56dc973242095cfab69618b02e7f3b"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x9, 0x1d, 0x20, 0x1, "35c09e05845898eac36bd0ec74446300ac2b8d0682e947197d880e937e4471bb"}) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:14:55 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x942, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) socket$inet(0x2, 0x1, 0x20000000084) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r5, r6, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r7, 0x40047703, 0xffffffbffffffffe) 19:14:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) [ 2370.036837] IPVS: ftp: loaded support on port[0] = 21 19:14:55 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x943, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000180)={'bond_slave_0\x00', 0x8}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x1}) 19:14:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:14:55 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x944, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x11, &(0x7f0000000040)=0x8, 0x4) 19:14:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) [ 2370.388922] IPVS: ftp: loaded support on port[0] = 21 19:14:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000000005007618060000f34bd8a7676b53570e89e56e6ae46a471f8e4d81dcf0d108478df167957343fa6ce702a7702a6c965466571350f84ea15e0513e6a5a10fd81d796ca4702bb00fc97578ff198c1641f0782436a1e5e0b5ed4e883627da58f1a52b6da97e93d710b0f7d5fdc1f5353833"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) gettid() ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:14:58 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x945, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) eventfd2(0x2, 0x80001) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:14:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:14:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:14:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) socket$inet(0x2, 0x1, 0x20000000084) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r5, r6, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r7, 0x40047703, 0xffffffbffffffffe) 19:14:58 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x946, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:14:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:14:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2) 19:14:58 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x947, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2373.484188] IPVS: ftp: loaded support on port[0] = 21 19:14:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:14:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) fcntl$setown(r0, 0x8, r1) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80000000, 0x200000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x48000, 0x0) linkat(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000001c0)='./file0\x00', 0x400) 19:15:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) r2 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0245720, 0x0) 19:15:00 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x948, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x4000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r1, 0x50, &(0x7f0000000180)}, 0x10) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 19:15:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x949, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:15:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) 19:15:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x94a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2376.103502] IPVS: ftp: loaded support on port[0] = 21 19:15:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:01 executing program 4: 19:15:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0xfffffffd, 0x0, r0}, 0x2c) 19:15:01 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x94b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r3}, 0xfffffffffffffdc8) setsockopt(r2, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r2) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0245720, 0x0) 19:15:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000200)="c66abb079d5299756f8c7d545c503436fd7d7bcde8b7fb703e387340d1465bae8111bce2ead369d2852a4d30579939df4bb1f9d15096eb3d746aaa6ce789d4fc2824e13800d33ffa5c162d3d91750a49f80fceee26ecc3b58d4e4f3c876f2e385f14e7a411a22a2cb261c234cc9230b42cd48a411e41ef59fabf635049ab04b8c9f9ac2afac68ea539618ee4e284f79e", 0x90) accept4(r1, 0x0, 0x0, 0x0) 19:15:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:02 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x94c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:02 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x94d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:02 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x94e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:15:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:03 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x94f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:03 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) getpgid(0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002040)="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", 0x990}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x8000000000000000}], 0x3, 0x1) 19:15:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:04 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x950, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x100000001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'batadv0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="1d"]}) [ 2378.928493] IPVS: ftp: loaded support on port[0] = 21 19:15:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:04 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x951, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) 19:15:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000500000000000000cf7618060000f34bd8a7676b53570e89e56e"], 0x0, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x2c) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) close(r1) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) flock(r1, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{}, 0x0, @in=@remote}}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, &(0x7f0000000540)='/dev/amidi#\x00'], &(0x7f0000000cc0)=[&(0x7f0000000c80)='/dev/dri/card#\x00'], 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), &(0x7f0000000400)=0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x48001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, 0x0) 19:15:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x952, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x953, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x954, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) [ 2381.571162] IPVS: ftp: loaded support on port[0] = 21 19:15:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:07 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x955, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:07 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x956, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:07 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x957, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:07 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x958, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:08 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x959, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:08 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x95a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:08 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x95b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x95c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:15:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x95d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x95e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:09 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x95f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:10 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x960, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:10 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x961, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:10 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x962, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x963, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x964, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:15:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x965, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:11 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x966, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x967, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x968, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x969, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:12 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x96a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:13 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x96b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:13 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x96c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:13 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x96d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x96e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x96f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x970, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:14 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x971, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:15 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x972, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:15 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x973, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:15 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x974, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:15:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x975, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x976, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x977, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:16 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x978, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:17 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x979, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:17 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x97a, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:17 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x97b, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x58) 19:15:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x97c, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x97d, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x97e, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x97f, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:18 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x980, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x981, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x982, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:19 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x983, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:20 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x984, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x58) 19:15:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r10 = getpgrp(r9) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, r10) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r11, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r11, 0x40047703, 0xffffffbffffffffe) 19:15:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(0xffffffffffffffff, r7, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4(0xffffffffffffffff, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(0xffffffffffffffff, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(0xffffffffffffffff, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) 19:15:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) 19:15:20 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x985, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:20 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x986, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x58) 19:15:20 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x987, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x58) 19:15:20 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x988, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x58) 19:15:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') sendfile(r7, r8, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r9, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r9, 0x40047703, 0xffffffbffffffffe) 19:15:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r4, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r6, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r7, 0xffffffffffffffff, &(0x7f0000000080), 0x1) dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(r2, 0x8, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r8, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0xffffffbffffffffe) 19:15:21 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x989, 0x0, 0x1, 0x0, [0x305f, 0x5f, 0xa]}, 0x21) 19:15:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x58) 19:15:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4(0xffffffffffffffff, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r3, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) sendto(0xffffffffffffffff, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) capset(&(0x7f0000000000)={0x4}, &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x2}}, 0x18) socket$inet(0x2, 0x1, 0x20000000084) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000740)='ne\x00\x00\x00\x00\x00\x00\x00\x01stats\x00P\x18`\'\xfc\xa6\x81\x00\xd3f\xd0\xf1\xc1lx\x83\x91\x913\x03\x9d09\xb0T jKEF\x10Z\xa0\x88\x96\xd1$\xeahZ\xac\x10\x16ex\xd0\x87\xdcud\xdd\v\xb87#1\xdcg\x1b\x86\xac:K\x05\x19\xc5\x91\x873\x95\xdb\x9f\t\xc1\x83o\xeb1\fK\xf1\xd7\xec\x05\xff\x1b\'\x05_\xe6Z\xc7\xf0d\x1d\x06\xa6%c\xa6\x99G\xee\xc5\xeb\xab\xfe\x9c^\xcc\x97\xb2\xa2\x99\v\x18i\xb5}I\xf9\xf4\x1d') exit(0x0) sendfile(r6, r7, &(0x7f0000000080), 0x1) dup3(0xffffffffffffffff, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = getpgrp(r8) syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x9, 0x40) fcntl$setown(0xffffffffffffffff, 0x8, r9) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087705, 0x6) ioctl$ASHMEM_SET_SIZE(r10, 0x40047703, 0xffffffbffffffffe) [ 2396.047302] ================================================================== [ 2396.054739] BUG: KASAN: use-after-free in __lock_acquire+0x3556/0x4a30 [ 2396.061406] Read of size 8 at addr ffff888096f386d0 by task kworker/u4:1/31257 [ 2396.068761] [ 2396.070405] CPU: 1 PID: 31257 Comm: kworker/u4:1 Not tainted 5.0.0-rc3+ #40 [ 2396.077495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.086864] Workqueue: ib_addr process_one_req [ 2396.091441] Call Trace: [ 2396.094035] dump_stack+0x1db/0x2d0 [ 2396.097668] ? dump_stack_print_info.cold+0x20/0x20 [ 2396.102702] ? __lock_acquire+0x3556/0x4a30 [ 2396.107035] print_address_description.cold+0x7c/0x20d [ 2396.112313] ? __lock_acquire+0x3556/0x4a30 [ 2396.116639] ? __lock_acquire+0x3556/0x4a30 [ 2396.120965] kasan_report.cold+0x1b/0x40 [ 2396.125032] ? __lock_acquire+0x3556/0x4a30 [ 2396.129357] __asan_report_load8_noabort+0x14/0x20 [ 2396.134289] __lock_acquire+0x3556/0x4a30 [ 2396.138439] ? __lock_acquire+0x572/0x4a30 19:15:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x58) [ 2396.142680] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 2396.148579] ? mark_held_locks+0x100/0x100 [ 2396.152812] ? mark_held_locks+0x100/0x100 [ 2396.157051] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.161984] ? unwind_next_frame.part.0+0x1ae/0xa90 [ 2396.167008] ? unwind_dump+0x190/0x190 [ 2396.170905] ? mark_held_locks+0x100/0x100 [ 2396.175140] ? __lock_is_held+0xb6/0x140 [ 2396.179213] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.184144] ? lock_acquire+0x1db/0x570 [ 2396.188131] ? print_usage_bug+0xd0/0xd0 [ 2396.192208] ? ___might_sleep+0x1e7/0x310 [ 2396.196357] ? __lock_is_held+0xb6/0x140 [ 2396.200426] lock_acquire+0x1db/0x570 [ 2396.204231] ? addr_handler+0xf9/0x440 [ 2396.208129] ? ___might_sleep+0x1e7/0x310 [ 2396.212284] ? lock_release+0xc40/0xc40 [ 2396.216266] ? addr_handler+0xf9/0x440 [ 2396.220160] ? addr_handler+0xf9/0x440 [ 2396.224065] __mutex_lock+0x12f/0x1670 [ 2396.227956] ? addr_handler+0xf9/0x440 [ 2396.231843] ? addr_handler+0xf9/0x440 [ 2396.235736] ? do_raw_spin_trylock+0x270/0x270 [ 2396.240322] ? mutex_trylock+0x2d0/0x2d0 [ 2396.244383] ? print_usage_bug+0xd0/0xd0 [ 2396.248450] ? print_usage_bug+0xd0/0xd0 [ 2396.252512] ? mark_held_locks+0x100/0x100 [ 2396.256751] ? __lock_acquire+0x572/0x4a30 [ 2396.260993] ? mark_held_locks+0x100/0x100 [ 2396.265226] ? lock_acquire+0x1db/0x570 [ 2396.269214] mutex_lock_nested+0x16/0x20 [ 2396.273280] ? kasan_check_read+0x11/0x20 [ 2396.277435] ? mutex_lock_nested+0x16/0x20 [ 2396.281674] addr_handler+0xf9/0x440 [ 2396.285396] ? trace_hardirqs_on_caller+0x310/0x310 [ 2396.290413] ? cma_work_handler+0x1f0/0x1f0 [ 2396.294732] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.299675] ? process_one_work+0xbf1/0x1ce0 [ 2396.304093] process_one_req+0x190/0x940 [ 2396.308156] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.313097] ? addr_resolve+0x1b90/0x1b90 [ 2396.317252] ? __lock_is_held+0xb6/0x140 [ 2396.321318] process_one_work+0xd0c/0x1ce0 [ 2396.325553] ? preempt_notifier_register+0x200/0x200 [ 2396.330655] ? __switch_to_asm+0x34/0x70 [ 2396.334729] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 2396.339401] ? __schedule+0x89f/0x1e60 [ 2396.343293] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2396.348311] ? retint_kernel+0x2d/0x2d [ 2396.352216] ? worker_thread+0x3b7/0x14a0 [ 2396.356365] ? find_held_lock+0x35/0x120 [ 2396.360433] ? lock_acquire+0x1db/0x570 [ 2396.364410] ? worker_thread+0x3cd/0x14a0 [ 2396.368559] ? kasan_check_read+0x11/0x20 [ 2396.372893] ? do_raw_spin_lock+0x156/0x360 [ 2396.377212] ? lock_release+0xc40/0xc40 [ 2396.381195] ? rwlock_bug.part.0+0x90/0x90 [ 2396.385441] ? trace_hardirqs_on_caller+0x310/0x310 [ 2396.390466] worker_thread+0x143/0x14a0 [ 2396.394451] ? process_one_work+0x1ce0/0x1ce0 [ 2396.398943] ? __kthread_parkme+0xc3/0x1b0 [ 2396.398958] ? lock_acquire+0x1db/0x570 [ 2396.407167] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2396.412287] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2396.416871] ? trace_hardirqs_on+0xbd/0x310 [ 2396.421200] ? __kthread_parkme+0xc3/0x1b0 [ 2396.425431] ? trace_hardirqs_off_caller+0x300/0x300 [ 2396.425446] ? do_raw_spin_trylock+0x270/0x270 [ 2396.425460] ? schedule+0x108/0x350 [ 2396.425474] ? do_raw_spin_trylock+0x270/0x270 [ 2396.425492] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2396.425507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2396.425519] ? __kthread_parkme+0xfb/0x1b0 [ 2396.425533] kthread+0x357/0x430 [ 2396.461577] ? process_one_work+0x1ce0/0x1ce0 [ 2396.466068] ? kthread_stop+0x920/0x920 [ 2396.470040] ret_from_fork+0x3a/0x50 [ 2396.473746] [ 2396.475362] Allocated by task 26835: [ 2396.479069] save_stack+0x45/0xd0 [ 2396.482515] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2396.487440] kasan_kmalloc+0x9/0x10 [ 2396.491058] kmem_cache_alloc_trace+0x151/0x760 [ 2396.495722] __rdma_create_id+0xce/0x630 [ 2396.499779] ucma_create_id+0x30f/0x910 [ 2396.504252] ucma_write+0x36b/0x480 [ 2396.507871] __vfs_write+0x116/0xb40 [ 2396.511582] vfs_write+0x20c/0x580 [ 2396.515113] ksys_write+0x105/0x260 [ 2396.518732] __ia32_sys_write+0x71/0xb0 [ 2396.522709] do_fast_syscall_32+0x333/0xf98 [ 2396.527023] entry_SYSENTER_compat+0x70/0x7f [ 2396.531414] [ 2396.533028] Freed by task 26835: [ 2396.536391] save_stack+0x45/0xd0 [ 2396.539835] __kasan_slab_free+0x102/0x150 [ 2396.544064] kasan_slab_free+0xe/0x10 [ 2396.547853] kfree+0xcf/0x230 [ 2396.550951] rdma_destroy_id+0x8be/0xd80 [ 2396.555007] ucma_destroy_id+0x34c/0x540 [ 2396.559059] ucma_write+0x36b/0x480 [ 2396.562679] __vfs_write+0x116/0xb40 [ 2396.566390] vfs_write+0x20c/0x580 [ 2396.569924] ksys_write+0x105/0x260 [ 2396.573545] __ia32_sys_write+0x71/0xb0 [ 2396.577518] do_fast_syscall_32+0x333/0xf98 [ 2396.581854] entry_SYSENTER_compat+0x70/0x7f [ 2396.586245] [ 2396.587867] The buggy address belongs to the object at ffff888096f38340 [ 2396.587867] which belongs to the cache kmalloc-2k of size 2048 [ 2396.600521] The buggy address is located 912 bytes inside of [ 2396.600521] 2048-byte region [ffff888096f38340, ffff888096f38b40) [ 2396.612470] The buggy address belongs to the page: [ 2396.617393] page:ffffea00025bce00 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 2396.627370] flags: 0x1fffc0000010200(slab|head) [ 2396.632040] raw: 01fffc0000010200 ffffea0002576608 ffffea00016f3d08 ffff88812c3f0c40 [ 2396.639924] raw: 0000000000000000 ffff888096f38340 0000000100000003 0000000000000000 [ 2396.647794] page dumped because: kasan: bad access detected [ 2396.653490] [ 2396.655104] Memory state around the buggy address: [ 2396.660025] ffff888096f38580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2396.667375] ffff888096f38600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2396.674725] >ffff888096f38680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2396.682071] ^ [ 2396.688030] ffff888096f38700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2396.695384] ffff888096f38780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2396.702726] ================================================================== [ 2396.710069] Disabling lock debugging due to kernel taint [ 2396.715525] Kernel panic - not syncing: panic_on_warn set ... [ 2396.721409] CPU: 1 PID: 31257 Comm: kworker/u4:1 Tainted: G B 5.0.0-rc3+ #40 [ 2396.729882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.739240] Workqueue: ib_addr process_one_req [ 2396.743820] Call Trace: [ 2396.746403] dump_stack+0x1db/0x2d0 [ 2396.750026] ? dump_stack_print_info.cold+0x20/0x20 [ 2396.755041] panic+0x2cb/0x65c [ 2396.758230] ? add_taint.cold+0x16/0x16 [ 2396.762209] ? kasan_check_read+0x11/0x20 [ 2396.766353] ? trace_hardirqs_on_caller+0x310/0x310 [ 2396.771365] ? do_raw_spin_trylock+0x270/0x270 [ 2396.775943] ? add_taint.cold+0x5/0x16 [ 2396.779826] ? trace_hardirqs_off+0xaf/0x310 [ 2396.784229] ? __lock_acquire+0x3556/0x4a30 [ 2396.788543] end_report+0x47/0x4f [ 2396.791995] ? __lock_acquire+0x3556/0x4a30 [ 2396.796317] kasan_report.cold+0xe/0x40 [ 2396.800291] ? __lock_acquire+0x3556/0x4a30 [ 2396.804616] __asan_report_load8_noabort+0x14/0x20 [ 2396.809537] __lock_acquire+0x3556/0x4a30 [ 2396.813680] ? __lock_acquire+0x572/0x4a30 [ 2396.817917] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 2396.823803] ? mark_held_locks+0x100/0x100 [ 2396.828034] ? mark_held_locks+0x100/0x100 [ 2396.832262] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.837195] ? unwind_next_frame.part.0+0x1ae/0xa90 [ 2396.842204] ? unwind_dump+0x190/0x190 [ 2396.846092] ? mark_held_locks+0x100/0x100 [ 2396.850322] ? __lock_is_held+0xb6/0x140 [ 2396.854379] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.859303] ? lock_acquire+0x1db/0x570 [ 2396.863287] ? print_usage_bug+0xd0/0xd0 [ 2396.867343] ? ___might_sleep+0x1e7/0x310 [ 2396.871488] ? __lock_is_held+0xb6/0x140 [ 2396.875549] lock_acquire+0x1db/0x570 [ 2396.879349] ? addr_handler+0xf9/0x440 [ 2396.883232] ? ___might_sleep+0x1e7/0x310 [ 2396.887372] ? lock_release+0xc40/0xc40 [ 2396.891346] ? addr_handler+0xf9/0x440 [ 2396.895233] ? addr_handler+0xf9/0x440 [ 2396.899115] __mutex_lock+0x12f/0x1670 [ 2396.903001] ? addr_handler+0xf9/0x440 [ 2396.906886] ? addr_handler+0xf9/0x440 [ 2396.910769] ? do_raw_spin_trylock+0x270/0x270 [ 2396.915350] ? mutex_trylock+0x2d0/0x2d0 [ 2396.919401] ? print_usage_bug+0xd0/0xd0 [ 2396.923460] ? print_usage_bug+0xd0/0xd0 [ 2396.927526] ? mark_held_locks+0x100/0x100 [ 2396.931765] ? __lock_acquire+0x572/0x4a30 [ 2396.936000] ? mark_held_locks+0x100/0x100 [ 2396.940228] ? lock_acquire+0x1db/0x570 [ 2396.944207] mutex_lock_nested+0x16/0x20 [ 2396.948264] ? kasan_check_read+0x11/0x20 [ 2396.952402] ? mutex_lock_nested+0x16/0x20 [ 2396.956633] addr_handler+0xf9/0x440 [ 2396.960341] ? trace_hardirqs_on_caller+0x310/0x310 [ 2396.965354] ? cma_work_handler+0x1f0/0x1f0 [ 2396.969674] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.974608] ? process_one_work+0xbf1/0x1ce0 [ 2396.979018] process_one_req+0x190/0x940 [ 2396.983077] ? add_lock_to_list.isra.0+0x450/0x450 [ 2396.988006] ? addr_resolve+0x1b90/0x1b90 [ 2396.992148] ? __lock_is_held+0xb6/0x140 [ 2396.996227] process_one_work+0xd0c/0x1ce0 [ 2397.000459] ? preempt_notifier_register+0x200/0x200 [ 2397.005559] ? __switch_to_asm+0x34/0x70 [ 2397.009621] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 2397.014284] ? __schedule+0x89f/0x1e60 [ 2397.018176] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2397.023194] ? retint_kernel+0x2d/0x2d [ 2397.027078] ? worker_thread+0x3b7/0x14a0 [ 2397.031223] ? find_held_lock+0x35/0x120 [ 2397.035280] ? lock_acquire+0x1db/0x570 [ 2397.039249] ? worker_thread+0x3cd/0x14a0 [ 2397.043396] ? kasan_check_read+0x11/0x20 [ 2397.047539] ? do_raw_spin_lock+0x156/0x360 [ 2397.051850] ? lock_release+0xc40/0xc40 [ 2397.055822] ? rwlock_bug.part.0+0x90/0x90 [ 2397.060066] ? trace_hardirqs_on_caller+0x310/0x310 [ 2397.065083] worker_thread+0x143/0x14a0 [ 2397.069057] ? process_one_work+0x1ce0/0x1ce0 [ 2397.073556] ? __kthread_parkme+0xc3/0x1b0 [ 2397.077782] ? lock_acquire+0x1db/0x570 [ 2397.081758] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2397.086856] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2397.091430] ? trace_hardirqs_on+0xbd/0x310 [ 2397.095744] ? __kthread_parkme+0xc3/0x1b0 [ 2397.099972] ? trace_hardirqs_off_caller+0x300/0x300 [ 2397.105069] ? do_raw_spin_trylock+0x270/0x270 [ 2397.109644] ? schedule+0x108/0x350 [ 2397.113266] ? do_raw_spin_trylock+0x270/0x270 [ 2397.117848] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2397.122943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2397.128472] ? __kthread_parkme+0xfb/0x1b0 [ 2397.132713] kthread+0x357/0x430 [ 2397.136080] ? process_one_work+0x1ce0/0x1ce0 [ 2397.140571] ? kthread_stop+0x920/0x920 [ 2397.144543] ret_from_fork+0x3a/0x50 [ 2397.149295] Kernel Offset: disabled [ 2397.152916] Rebooting in 86400 seconds..