[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.454645][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 65.454657][ T24] audit: type=1800 audit(1565624180.531:29): pid=9746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 65.481141][ T24] audit: type=1800 audit(1565624180.531:30): pid=9746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.215' (ECDSA) to the list of known hosts. 2019/08/12 15:36:31 fuzzer started 2019/08/12 15:36:33 dialing manager at 10.128.0.26:33609 2019/08/12 15:36:33 syscalls: 2487 2019/08/12 15:36:33 code coverage: enabled 2019/08/12 15:36:33 comparison tracing: enabled 2019/08/12 15:36:33 extra coverage: extra coverage is not supported by the kernel 2019/08/12 15:36:33 setuid sandbox: enabled 2019/08/12 15:36:33 namespace sandbox: enabled 2019/08/12 15:36:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/12 15:36:33 fault injection: enabled 2019/08/12 15:36:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/12 15:36:33 net packet injection: enabled 2019/08/12 15:36:33 net device setup: enabled 15:37:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x0, 0x100000001, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, r3, 0x3, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) 15:37:53 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x3) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='batadv0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf1, 0x21fc}, 0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) syzkaller login: [ 158.709270][ T9913] IPVS: ftp: loaded support on port[0] = 21 [ 158.823696][ T9913] chnl_net:caif_netlink_parms(): no params data found [ 158.883297][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.891799][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.899824][ T9913] device bridge_slave_0 entered promiscuous mode [ 158.908078][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.915202][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.923316][ T9913] device bridge_slave_1 entered promiscuous mode 15:37:54 executing program 2: [ 158.942902][ T9913] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.954688][ T9913] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.966324][ T9916] IPVS: ftp: loaded support on port[0] = 21 [ 159.018580][ T9913] team0: Port device team_slave_0 added [ 159.025479][ T9913] team0: Port device team_slave_1 added 15:37:54 executing program 3: [ 159.108925][ T9913] device hsr_slave_0 entered promiscuous mode [ 159.157103][ T9913] device hsr_slave_1 entered promiscuous mode 15:37:54 executing program 4: [ 159.294897][ T9918] IPVS: ftp: loaded support on port[0] = 21 [ 159.379879][ T9920] IPVS: ftp: loaded support on port[0] = 21 [ 159.392267][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.399408][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.406806][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.413866][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state 15:37:54 executing program 5: [ 159.460479][ T9923] IPVS: ftp: loaded support on port[0] = 21 [ 159.470636][ T9916] chnl_net:caif_netlink_parms(): no params data found [ 159.585611][ T9916] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.593201][ T9916] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.601598][ T9916] device bridge_slave_0 entered promiscuous mode [ 159.627710][ T9916] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.634804][ T9916] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.642828][ T9916] device bridge_slave_1 entered promiscuous mode [ 159.660797][ T9916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.705981][ T9926] IPVS: ftp: loaded support on port[0] = 21 [ 159.714925][ T9916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.741550][ T9920] chnl_net:caif_netlink_parms(): no params data found [ 159.774884][ T9913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.783415][ T9916] team0: Port device team_slave_0 added [ 159.789722][ T9918] chnl_net:caif_netlink_parms(): no params data found [ 159.818770][ T9916] team0: Port device team_slave_1 added [ 159.847955][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.868278][ T2793] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.875880][ T2793] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.883956][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 159.909486][ T9920] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.917533][ T9920] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.929043][ T9920] device bridge_slave_0 entered promiscuous mode [ 159.938062][ T9920] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.945392][ T9920] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.953741][ T9920] device bridge_slave_1 entered promiscuous mode [ 159.971101][ T9920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.986936][ T9923] chnl_net:caif_netlink_parms(): no params data found [ 159.997631][ T9920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.015135][ T9913] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.036346][ T9920] team0: Port device team_slave_0 added [ 160.098796][ T9916] device hsr_slave_0 entered promiscuous mode [ 160.137801][ T9916] device hsr_slave_1 entered promiscuous mode [ 160.196600][ T9916] debugfs: Directory 'hsr0' with parent '/' already present! [ 160.220761][ T9920] team0: Port device team_slave_1 added [ 160.227977][ T9918] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.235342][ T9918] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.244178][ T9918] device bridge_slave_0 entered promiscuous mode [ 160.252428][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.261095][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.269970][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.277415][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.297274][ T9923] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.304547][ T9923] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.312302][ T9923] device bridge_slave_0 entered promiscuous mode [ 160.322460][ T9923] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.329632][ T9923] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.337605][ T9923] device bridge_slave_1 entered promiscuous mode [ 160.344593][ T9918] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.352180][ T9918] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.361360][ T9918] device bridge_slave_1 entered promiscuous mode [ 160.368941][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.379087][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.388867][ T3489] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.397006][ T3489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.405139][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.413940][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.430445][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.439000][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.449148][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.483294][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.492388][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.501871][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.517903][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.530734][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.540015][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.548851][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.628756][ T9920] device hsr_slave_0 entered promiscuous mode [ 160.666870][ T9920] device hsr_slave_1 entered promiscuous mode [ 160.726590][ T9920] debugfs: Directory 'hsr0' with parent '/' already present! [ 160.742908][ T9923] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.778405][ T9918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.791247][ T9923] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.813348][ T9923] team0: Port device team_slave_0 added [ 160.830838][ T9918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.850142][ T9923] team0: Port device team_slave_1 added [ 160.868393][ T9916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.879448][ T9926] chnl_net:caif_netlink_parms(): no params data found [ 160.900865][ T9918] team0: Port device team_slave_0 added [ 160.968683][ T9923] device hsr_slave_0 entered promiscuous mode [ 161.006991][ T9923] device hsr_slave_1 entered promiscuous mode [ 161.046746][ T9923] debugfs: Directory 'hsr0' with parent '/' already present! [ 161.080137][ T9918] team0: Port device team_slave_1 added [ 161.085871][ T9926] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.093471][ T9926] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.101274][ T9926] device bridge_slave_0 entered promiscuous mode [ 161.108793][ T9926] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.115837][ T9926] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.123533][ T9926] device bridge_slave_1 entered promiscuous mode [ 161.142639][ T9926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.166635][ T9926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.228864][ T9918] device hsr_slave_0 entered promiscuous mode [ 161.266826][ T9918] device hsr_slave_1 entered promiscuous mode [ 161.306649][ T9918] debugfs: Directory 'hsr0' with parent '/' already present! [ 161.324951][ T9916] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.341705][ T9913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.354380][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.363647][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.372214][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.381255][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.390115][ T9924] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.401560][ T9924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.410857][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.419980][ T9926] team0: Port device team_slave_0 added [ 161.440952][ T9926] team0: Port device team_slave_1 added [ 161.460450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.469761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.479827][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.487549][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.495165][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.503940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.512359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.522446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.531563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.540904][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.550644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.567140][ T9920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.582104][ T9920] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.590971][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.606328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.616111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.624581][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.632901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.641216][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.653691][ T9916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.690704][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.706076][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.719017][ T9924] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.726528][ T9924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.739299][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.751142][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.760893][ T9924] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.765675][ T9941] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 161.767975][ T9924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.780342][ T9920] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 161.795832][ T9920] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 161.818082][ T9923] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.830139][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.842508][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.852008][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.862094][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.872097][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.881503][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.890160][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.898782][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.907108][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.915598][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.924074][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.933036][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.941413][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.988101][ T9926] device hsr_slave_0 entered promiscuous mode [ 162.037277][ T9926] device hsr_slave_1 entered promiscuous mode [ 162.096476][ T9926] debugfs: Directory 'hsr0' with parent '/' already present! [ 162.107655][ T9916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.119918][ T9923] 8021q: adding VLAN 0 to HW filter on device team0 15:37:57 executing program 0: 15:37:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="4ef27f454c460000002f006c000000000000345c01442305000000000000e10000f5002100000900608c070056bdb22ae0c0e79710565e90"], 0x38) [ 162.149959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.160672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.212144][ T9920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.241934][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 15:37:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 162.265865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.275674][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.282874][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.292645][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.301227][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:37:57 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"/417], 0x1d0}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0x0, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) [ 162.309959][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.317603][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.325519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.335253][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.344013][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.352949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.368777][ T9923] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 162.379557][ T9923] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.397420][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.405388][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.425449][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.443120][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.452151][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.464539][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.473389][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.481684][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.490673][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.500974][ T9918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.546393][ C1] hrtimer: interrupt took 35133 ns [ 162.575970][ T9923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.610373][ T9918] 8021q: adding VLAN 0 to HW filter on device team0 15:37:57 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\b\x8c\xfa3\x90\xc8\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\xf7\xa42\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009\x10wP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x11c) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080), 0xfffffe48) [ 162.623470][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.631649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.678354][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.691162][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.710960][ T2793] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.718502][ T2793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.732642][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.748905][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.758211][ T2793] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.765405][ T2793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.773289][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.784428][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.799376][ T9926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.802081][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.824411][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:37:57 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"/417], 0x1d0}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0x0, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) [ 162.839253][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.856999][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.864845][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.882393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.885265][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.900978][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.902048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.914037][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.925255][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.930482][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.933308][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.948594][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.953686][ T9918] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 162.957743][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 162.969639][ T9918] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.974336][ T9924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 163.002652][ T9926] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.009873][ T9924] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 163.018018][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.031831][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:37:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/packet\x00') socket$inet(0x2, 0xa, 0x0) preadv(r1, &(0x7f00000017c0), 0x333, 0x38) [ 163.042146][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.070620][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.091181][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.101147][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.110275][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.118679][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.138241][ T9918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.178835][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.202683][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.235732][ T9924] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.242986][ T9924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.252332][T10011] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 163.274624][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.292439][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.303897][ T9924] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.311187][ T9924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.333505][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.343990][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.353203][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.361660][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.370481][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.379946][ T9924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:37:58 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @multicast2}, 0xc) r0 = syz_open_procfs(0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000300)) preadv(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) connect$ax25(0xffffffffffffffff, 0x0, 0x0) timer_delete(0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='coredump_filter\x00') setsockopt(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r1) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000240)=0x7fffffff) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x3, 0x4, 0xb1, &(0x7f0000000000)="9b931235d39021b7b3f95dbeed6767e3987f6278a688c8ca7c0d15b6209e70a3039c98793dd91b17e91b2d7283accddf519505b75d2263d2945189e1490a279690ae916060f95550ff76525b51b9842539ee92fd62e98b045c98ebcd7cba740c7758a12433cd1cd7303a1dae9769d315699cb54a2347573c06a2898f9a960829ab7f13ada9faedf818bb88c01ecc6c940a19c357ff4b8b12ce7b3b800dfd1a8d20241319c84412b473d0428b951b350374"}) [ 163.395288][ T9926] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 163.408835][ T9926] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.426779][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.440593][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.460384][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.473932][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.484095][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.495301][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.512495][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.529579][ T9926] 8021q: adding VLAN 0 to HW filter on device batadv0 15:37:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:37:58 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x7fffffff, 0x9}) 15:37:58 executing program 0: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"/417], 0x1d0}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0x0, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:37:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) clone(0x86080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:37:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:37:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}], 0x2}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x123e, 0x0, 0x0, 0x800e00687) shutdown(r1, 0x0) shutdown(0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r2, 0x0) 15:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}], 0x2}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x123e, 0x0, 0x0, 0x800e00687) shutdown(r1, 0x0) shutdown(0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r2, 0x0) 15:37:59 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810c000f80ecdb4cb90402c804a00b00000010000afb120001000e00da1b40d819a9060061e90000", 0x2e}], 0x1}, 0x0) 15:37:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904034865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 15:37:59 executing program 2: fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, 0x0, 0x0, 0xffffffffffffffff) 15:37:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x280000) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @empty}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 15:37:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x123e, 0x0, 0x0, 0x800e00687) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0), 0x100000000000000e, 0x0, 0xffffffffffffffaa}, 0x0) shutdown(r2, 0x0) [ 164.078365][T10076] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 15:37:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$alg(0x26, 0x5, 0x0) getgid() r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) lstat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x80800) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x5000000000043f) getsockopt$inet6_mreq(r3, 0x29, 0x14, 0x0, 0x0) 15:37:59 executing program 4: clock_gettime(0x1, &(0x7f0000000180)) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)={{0x0, 0x7530}, {0x77359400}}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x20) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'veth0_to_bridge\x00', {0x2, 0x4e23, @local}}) inotify_init1(0x800) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f00000003c0)=0x4053a, 0x4) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) write$cgroup_type(r5, &(0x7f0000000100)='threaded\x00', 0xffea) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0x163) 15:37:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x3d3427e) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x0, 0x0) 15:37:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:37:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) 15:37:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) [ 164.293952][T10097] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:37:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ext4\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) 15:37:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:37:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:37:59 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/222, 0xde}], 0x1, 0x0) 15:37:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) 15:37:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:37:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:37:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) 15:37:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) getpgid(0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) 15:37:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:37:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:37:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) 15:37:59 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:37:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:37:59 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_get$pid(0x2, 0x0) 15:37:59 executing program 0: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) 15:37:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:00 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x0, 0x0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x40) ptrace$cont(0x9, r1, 0x0, 0x0) 15:38:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 15:38:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @empty}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$TCSETS(r0, 0x5402, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) write$binfmt_elf64(r2, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x19, 0x3, 0x2, 0xffffffffffff8001, 0x3, 0x3, 0x6, 0x149, 0x40, 0x186, 0x5, 0x10001, 0x38, 0x1, 0x8, 0x3ff, 0xfffffffffffffff9}, [{0x70000000, 0x101, 0x624, 0x2, 0x0, 0x800, 0xfffffffffffffff8, 0x5}, {0x4, 0x5, 0x0, 0x0, 0x1000, 0x4, 0xff, 0x3}], "1ba72217770d06b2e95118924e5a9ddcbe2bb68028d5d9806f02cb1ef1685731cb2a678d8fd4bf4f970a", [[], [], [], [], [], []]}, 0x6da) 15:38:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:00 executing program 5: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 15:38:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02af3d85a825b3b1ffbe265e69fb70921900009c"], 0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000400c0080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 15:38:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) 15:38:00 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe8800000000000000000000000001", @ANYRES32=r1, @ANYBLOB="00000000c00000000000000029000000360000008414000000000000040103075800000006140406004a080000000000001f0000000000000000040000000000000700000000000000004000000000000000000000000000000200000000000000140700000000000020020000000000000200000000000000071800000002040040000100010000000000060000000000000007280000000808ff04000500000000000000060000000000000008000000000000000600000000000000c20400000007007800000000000000290000003900"], 0x100}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) 15:38:01 executing program 5: 15:38:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) 15:38:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="37000000000091528ddf"]}) 15:38:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:01 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe8800000000000000000000000001", @ANYRES32=r1, @ANYBLOB="00000000c00000000000000029000000360000008414000000000000040103075800000006140406004a080000000000001f0000000000000000040000000000000700000000000000004000000000000000000000000000000200000000000000140700000000000020020000000000000200000000000000071800000002040040000100010000000000060000000000000007280000000808ff04000500000000000000060000000000000008000000000000000600000000000000c20400000007007800000000000000290000003900"], 0x100}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:01 executing program 5: 15:38:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) 15:38:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8f454c46"], 0x4) 15:38:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="00080000000000007bf070") r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x4000000001) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) sendmmsg$unix(r1, 0x0, 0x0, 0x4008094) 15:38:01 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe8800000000000000000000000001", @ANYRES32=r1, @ANYBLOB="00000000c00000000000000029000000360000008414000000000000040103075800000006140406004a080000000000001f0000000000000000040000000000000700000000000000004000000000000000000000000000000200000000000000140700000000000020020000000000000200000000000000071800000002040040000100010000000000060000000000000007280000000808ff04000500000000000000060000000000000008000000000000000600000000000000c20400000007007800000000000000290000003900"], 0x100}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) 15:38:01 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x14}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 15:38:01 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000640)=[{&(0x7f0000000280)="9d908064e629ad292b3f5bc4a298fb175fefd9dbed7adf31283b56b45eeeca0ad1191e96d766a6da28aa97f54357fa5fee508c48363c666138afaaf3", 0x3c, 0x6e}, {&(0x7f0000000440)="5ea0bd", 0x3}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000030000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 15:38:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x8000000000d}, 0xe) [ 166.403625][T10298] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:38:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) 15:38:01 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe8800000000000000000000000001", @ANYRES32=r1, @ANYBLOB="00000000c00000000000000029000000360000008414000000000000040103075800000006140406004a080000000000001f0000000000000000040000000000000700000000000000004000000000000000000000000000000200000000000000140700000000000020020000000000000200000000000000071800000002040040000100010000000000060000000000000007280000000808ff04000500000000000000060000000000000008000000000000000600000000000000c20400000007007800000000000000290000003900"], 0x100}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:01 executing program 0: 15:38:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:01 executing program 0: 15:38:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) [ 166.656690][T10311] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:38:01 executing program 0: 15:38:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) [ 166.740913][T10311] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 166.782638][T10311] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 166.880629][T10311] EXT4-fs error (device loop5): __ext4_iget:5088: inode #2: block 2064: comm syz-executor.5: invalid block [ 166.899271][T10311] EXT4-fs (loop5): get root inode failed [ 166.913547][T10311] EXT4-fs (loop5): mount failed [ 167.062269][T10311] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 167.072362][T10311] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 167.085939][T10311] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 167.099754][T10311] EXT4-fs: failed to create workqueue [ 167.107921][T10311] EXT4-fs (loop5): mount failed 15:38:02 executing program 5: 15:38:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:02 executing program 2: 15:38:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:02 executing program 0: 15:38:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:02 executing program 0: 15:38:02 executing program 2: 15:38:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:02 executing program 0: 15:38:02 executing program 2: 15:38:02 executing program 5: 15:38:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:03 executing program 0: 15:38:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:03 executing program 5: 15:38:03 executing program 2: 15:38:03 executing program 0: 15:38:03 executing program 5: 15:38:03 executing program 2: 15:38:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:03 executing program 5: 15:38:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000200)='-selinux\x00\x92\xd9;K\xef\xa4\x1bU*\x85R\xc2J\"4\t\x17\xef\xd6\x98\xe3\xff', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000440)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f0000001940)=ANY=[@ANYBLOB="d5822448f36946e380643ebe34ac2c5de36c969046b9f06e"], 0x18) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) 15:38:03 executing program 0: socketpair(0x1a, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fsetxattr$security_selinux(r0, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:apm_bios_t:s0\x00', 0xb7, 0x3) dup(0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) clone(0x40104800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02af3d85a825b3b1ffbe265e69fb70921900009c"], 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000400c0080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 15:38:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 15:38:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 15:38:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:04 executing program 2: 15:38:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:04 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3543034571923a2c0e75ecb55217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1ba8116a4ae39f9429436c5e0eadfe"], 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bp\a\x00\x00\x00\x00\x05\x00'}) socketpair(0x0, 0x3, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c0f0df81f47442a"], 0x10094) 15:38:04 executing program 0: 15:38:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:04 executing program 0: 15:38:04 executing program 2: 15:38:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:05 executing program 0: 15:38:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:05 executing program 2: 15:38:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:05 executing program 2: 15:38:05 executing program 0: 15:38:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:05 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3543034571923a2c0e75ecb55217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1ba8116a4ae39f9429436c5e0eadfe"], 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bp\a\x00\x00\x00\x00\x05\x00'}) socketpair(0x0, 0x3, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c0f0df81f47442a"], 0x10094) 15:38:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 15:38:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, 0x0, &(0x7f0000000180)) 15:38:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000780)="0f732984a0f1f51aa438dc0770612dae49f8420ffe8346374bdb9884869d9e1f127c271677f17c97fdf1bedb05ac0397855e79dc80269b39f0900681aa76a0dbc771139b3f03185739561c842adf3a91d778c42021da0fa2ad8af7ba7a241089cd16ea3531eb4cdcbe188f4b7b414bb97a777ac871be9fec37a23b2308624e64d72f8deab27e49619e101cec882a1d725c37a2a17ab40269b914f67640c72edbffa1495562b266a5c8bcdc0d9d5ca8dd79dcf6ab9f09759625ca5a8a4e00221240eed3ba97017803000000c806edefa3b191d0bc7958cd58a4681d1f4a82911022305bc6bf2367c97266", 0xffffff77}, {&(0x7f0000000480)="07e453a38719fa29388b043e2d4690f5bfcfa45b453b52aacffb8e9334fa17c03dc653ed23a0c44f5935630a5a31cf1b1fd9095119e3e8b392f027b76970b1e65d1ca0f28dc4e70bd4e7cf7fe6830845bed9b8e1a1437745d2a0585dc411f5a3423eff157f7912", 0x4c}, {&(0x7f0000000500)="2a26f631ece9cdc5d4069bcefda6befbf5140e2c501df0f99641ac8d318bf436963245d667", 0x25}, {&(0x7f0000000540)="2e159dbd460e1223a9ef284118313d079df7b8ca16cfb2f50039f4e96ec0eeb27ffd05144872d3c51600d44bd26a55d08b367be1a6bf6bf3511b11648d58c4af35848f8e733d35aeb93a48ac895acf3ec5ee403241a0be33246b26b6cfee0fc308ca21f404982846b9fe9bcf19e9b3b8cbe0041d4859cc19ce35046ad68cb7240fc069c21b61e9457c2b2c4bca679e31d68595816ca36efce916b945f737409c6f349a1c5e9b0b17896feb870717f68ecd456f7674f9b294fce2265af21509bc85723f8ac79bf45948705c2383f709caaf87c895c89ef80e5ad7240f3e46e5180c8fec6763a9", 0xe6}, {&(0x7f0000000640)="2109ec7f82636a23c47317cde5498e4ce46b77c8ae76169d2d2c26947509b72091f25549900ea3d7232f42f622158385d69d723a5b403c8be42e03a6ae4c39929e59066596d665a4fb950306074dd871199859a94c47d6f627706b72ac411569f1f6d8d6a1f403b24ddbc8e48fc25f8ef4cb1f244e7af019d591eebc385a385835f4f3cdba2340ae54a6df0c93e4a48704b7164794b125776acd3bbf837dd5125985b1f72d9c78679704cb10803818d267ddab942b06ae4dc20dbf", 0xbb}], 0x5, &(0x7f0000005580)=ANY=[@ANYBLOB="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"], 0x2518}, 0x8004) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) 15:38:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000300)=0x200000072, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003c80)={0x0, &(0x7f0000003c40)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x80000000004e22, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x5, 0x2000000000, 0x3) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x400000000141042, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f00000004c0)='/dev/loop#\x00', 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) renameat2(r2, &(0x7f0000000340)='./bus\x00', r2, &(0x7f0000003bc0)='./bus\x00', 0x7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) socketpair$unix(0x1, 0x2004, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000003b80)='TIPCv2\x00') r5 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x91}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r6) write(r5, &(0x7f0000000b40)="d5839137fcdc5e61ff9c97d1a2ecb9649affcacd5ddda9d7d8bb1033c36218d45221722fc59920a829a95e0ad6b0f327eacdefae3dde2f7105af364431619f6c5f37a84d251412fca423bd3f4d08000000aa9861bfefd5d2fac74975dc1cb74bc95bc92f7214959345e738241b33c257109b65664bd4bf2189f24ecc4eecc2e21fdd95c0b89f8c05b1a9", 0x8a) sendfile(r3, r4, 0x0, 0x80003) 15:38:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:06 executing program 5: wait4(0x0, 0x0, 0x0, &(0x7f0000000300)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x20) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) add_key$user(&(0x7f0000000140)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) r1 = memfd_create(&(0x7f0000000040)='/dev/loop#\x00', 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000006c0)={0x0, 0x9, 0x7, 0x80000001, 0x0, 0x80, 0x2, 0x1, 0x3, 0x7fffffff, 0x4, 0x5, 0x9, 0xfffffffffffffffd, &(0x7f00000005c0)=""/189}) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x15, 0x8, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x701}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x199}, @call={0x85, 0x0, 0x0, 0x5}, @exit, @alu={0x4, 0x6, 0x8, 0xa, 0x7, 0xffffffffffffffe0, 0xfffffffffffffffd}]}, &(0x7f0000000180)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x2, r0, 0x8, &(0x7f0000000880)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0x4, 0x6, 0x70}, 0x10}, 0x70) sendfile(r1, r0, 0x0, 0x2000005) 15:38:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:38:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7e2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="0080656d6f72792024813c8dcba76e9b0fe9951aa9edf3e5afc3e065a782afa721d4ac87505158c0cacca2f9f635bd6ccdec04d3927782dac0d3be3d"], 0x3c) 15:38:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x1fdbcf9a7351b556}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:38:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:07 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:38:07 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r7 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r8, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r8, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r7, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000240)=r6, 0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000c40)={r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 15:38:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) [ 172.523785][T10602] llc_conn_state_process: llc_conn_service failed [ 172.532096][T10603] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:38:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:07 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:08 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r7 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r8, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r8, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r7, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000240)=r6, 0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000c40)={r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 15:38:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) [ 173.166326][T10608] llc_conn_state_process: llc_conn_service failed 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:08 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 15:38:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 173.528413][T10677] llc_conn_state_process: llc_conn_service failed 15:38:08 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r7 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r8, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r8, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r7, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000240)=r6, 0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000c40)={r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 15:38:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 15:38:08 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:08 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 15:38:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 15:38:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 173.998214][T10710] llc_conn_state_process: llc_conn_service failed 15:38:09 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r7 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r8, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r8, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r7, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000240)=r6, 0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000c40)={r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 15:38:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:09 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 15:38:09 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:09 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:09 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:09 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 174.521296][T10752] llc_conn_state_process: llc_conn_service failed 15:38:09 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r7 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r8, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r8, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r7, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000240)=r6, 0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000c40)={r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 15:38:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:09 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:09 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:09 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:09 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) [ 175.023880][T10788] llc_conn_state_process: llc_conn_service failed 15:38:10 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r6 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r7, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r7, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000000240)=r5, 0x4) 15:38:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:10 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:10 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:10 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:10 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) [ 175.464078][T10816] llc_conn_state_process: llc_conn_service failed 15:38:10 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r5 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r6, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r6, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000980)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e75b34ab45f90c1b05abb3c4b5ad359d2a459d2b83a59fa1c91e82fb253dd323bc6df8feb461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83cc20db3334b03697f3d1cb99f304d3bdb75d5e18266b17266b0a3c9a2ad7ad2e22bd11af6cb34ac972e95002e9b59fd28874fbea6f54fce6c5cab79c89894d960375089673217a286c7c8bf32aba0c726095e45ead30441edd20784a443b82ffe3d381028b449c7b86af3a94c4e989608ae65b348571d13a924d80bc19d23df81d392b2f116ba965a60b60c0e6b8557d669ae0e1bd46f2b77fb232fb5cf1bede496fea701bbe389f504eb415c5f8eebebb1b3c438248025e9bd424581377e15b81f78a96585041522ece840655a0512be3ec0fcfb8508b271ff960455d342ceaaa2ec9503467b38e0620aa243ef9e9d0bd11000000000004d2011248d2c6fd7f9094e97595536c0ab74a1a2575b8a36c2bd6a03b3473a5db8615884cc111cc1fed5f5d3d0671208cede932e4698249f77ce770bee0209ce0a1575edc2ebe14d67caff81794623245fb9068e99c878dacf8e5a38c81f48c703ab30053b7a912b46ce20df69301051c691428bdbe922ac1658784e6926fdba92c3ef976f0f47e90e5f2f53e244e87c5e31ce0bb28f35a8f0000000000"]) 15:38:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:10 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:10 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:10 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 175.881683][T10850] llc_conn_state_process: llc_conn_service failed 15:38:11 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r5 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r6, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r6, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) 15:38:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x10) 15:38:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:11 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:11 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) [ 176.419266][T10888] llc_conn_state_process: llc_conn_service failed 15:38:11 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:11 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) r5 = socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r6, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r6, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) 15:38:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:11 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:11 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) [ 176.969873][T10927] llc_conn_state_process: llc_conn_service failed 15:38:12 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0xffffff19) 15:38:12 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:12 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) [ 177.524072][T10971] llc_conn_state_process: llc_conn_service failed 15:38:12 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) 15:38:12 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 15:38:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:12 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) 15:38:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) [ 177.951731][T11003] llc_conn_state_process: llc_conn_service failed 15:38:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r2}, 0x3dd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r4, 0x40049409, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r4, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r4, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) 15:38:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) 15:38:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 15:38:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) [ 178.140249][T11020] llc_conn_state_process: llc_conn_service failed 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r4, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r4, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) 15:38:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 15:38:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r4, 0x10c, 0x3, &(0x7f0000000000), 0x4) [ 178.288023][T11037] llc_conn_state_process: llc_conn_service failed 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 15:38:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, 0x0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, 0x0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) 15:38:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) 15:38:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, 0x0, 0x0) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) 15:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r0, 0xd, 0x2}, 0xd) 15:38:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:14 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) 15:38:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:14 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) 15:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0}, 0xe) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0}, 0xe) 15:38:14 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xd, 0x2}, 0xd) 15:38:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0}, 0xe) 15:38:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x2}, 0xd) 15:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:14 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r2, 0x40049409, r2) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x2}, 0xd) 15:38:15 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:15 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r2, 0x40049409, r2) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0x0, 0x2}, 0xd) 15:38:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:15 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:15 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:15 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:15 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5df"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:15 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:15 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 15:38:15 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:15 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:15 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 15:38:15 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(0x0, 0xa4f8c83a01f1e3b5, 0x0, 0x0, 0x0, 0x0) 15:38:16 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:16 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8840000, 0x0, 0x0, 0x0, 0x0) 15:38:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 15:38:16 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:16 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:16 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"], 0x1c8}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:16 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000020006000a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:38:16 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:16 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) [ 181.785588][T11305] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 15:38:16 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) [ 181.852977][T11305] bridge_slave_0: FDB only supports static addresses 15:38:17 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000020006000a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 182.055829][T11339] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 182.075384][T11339] bridge_slave_0: FDB only supports static addresses 15:38:17 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:17 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x123e, 0x0, 0x0, 0x800e00687) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) execve(0x0, 0x0, 0x0) shutdown(r4, 0x0) readv(r3, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}, {0x0}, {0x0}], 0x3) shutdown(r2, 0x0) 15:38:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:17 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"], 0x1c8}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:17 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:17 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:17 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:17 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:17 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:18 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"], 0x1c8}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:18 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"], 0x1c8}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:18 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r1, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:18 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:18 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:38:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:18 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="00000000c00000000000000029000000360000008414000000000000040103075800000006140406004a080000000000001f0000000000000000040000000000000700000000000000004000000000000000000000000000000200000000000000140700000000000020020000000000000200000000000000071800000002040040000100010000000000060000000000000007280000000808ff04000500000000000000060000000000000008000000000000000600000000000000c204000000070078000000000000002900000039000000ff0c020600000000025cc7baf54291072c0aa53a7c8f7993ff02000000000000000000000000000100000000000000000000ffffe000000100000000000000000000ffffe00000021e6ee416abff16b8f65e0473f4ac168d00000000000000000000ffffac1414aa680000000000000029000000390000008f0a4cff0000000041dd4458b18f6bc7b8bb3ed1a05a0aa8fe8000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000001ff020000000000000000000000000001"], 0x1c8}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:19 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000780)="0f732984a0f1f51aa438dc0770612dae49f8420ffe8346374bdb9884869d9e1f127c271677f17c97fdf1bedb05ac0397855e79dc80269b39f0900681aa76a0dbc771139b3f03185739561c842adf3a91d778c42021da0fa2ad8af7ba7a241089cd16ea3531eb4cdcbe188f4b7b414bb97a777ac871be9fec37a23b2308624e64d72f8deab27e49619e101cec882a1d725c37a2a17ab40269b914f67640c72edbffa1495562b266a5c8bcdc0d9d5ca8dd79dcf6ab9f09759625ca5a8a4e00221240eed3ba97017803000000c806edefa3b191d0bc7958cd58a4681d1f4a82911022305bc6bf2367c97266", 0xffffff77}, {&(0x7f0000000480)="07e453a38719fa29388b043e2d4690f5bfcfa45b453b52aacffb8e9334fa17c03dc653ed23a0c44f5935630a5a31cf1b1fd9095119e3e8b392f027b76970b1e65d1ca0f28dc4e70bd4e7cf7fe6830845bed9b8e1a1437745d2a0585dc411f5a3423eff157f7912", 0x4c}, {&(0x7f0000000500)="2a26f631ece9cdc5d4069bcefda6befbf5140e2c501df0f99641ac8d318bf436963245d667", 0x25}, {&(0x7f0000000540)="2e159dbd460e1223a9ef284118313d079df7b8ca16cfb2f50039f4e96ec0eeb27ffd05144872d3c51600d44bd26a55d08b367be1a6bf6bf3511b11648d58c4af35848f8e733d35aeb93a48ac895acf3ec5ee403241a0be33246b26b6cfee0fc308ca21f404982846b9fe9bcf19e9b3b8cbe0041d4859cc19ce35046ad68cb7240fc069c21b61e9457c2b2c4bca679e31d68595816ca36efce916b945f737409c6f349a1c5e9b0b17896feb870717f68ecd456f7674f9b294fce2265af21509bc85723f8ac79bf45948705c2383f709caaf87c895c89ef80e5ad7240f3e46e5180c8fec6763a9", 0xe6}, {&(0x7f0000000640)="2109ec7f82636a23c47317cde5498e4ce46b77c8ae76169d2d2c26947509b72091f25549900ea3d7232f42f622158385d69d723a5b403c8be42e03a6ae4c39929e59066596d665a4fb950306074dd871199859a94c47d6f627706b72ac411569f1f6d8d6a1f403b24ddbc8e48fc25f8ef4cb1f244e7af019d591eebc385a385835f4f3cdba2340ae54a6df0c93e4a48704b7164794b125776acd3bbf837dd5125985b1f72d9c78679704cb10803818d267ddab942b06ae4dc20dbf", 0xbb}], 0x5, &(0x7f0000005580)=ANY=[@ANYBLOB="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"], 0x2518}, 0x8004) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) 15:38:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:19 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:19 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x800) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000040)={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4c9eb59f0018f88180ed0affd9ec0eb1f4c5e58dd6490afb686b964379a5ebd4a5b0006ab9fc09ce9f679c6a7f2e0dcda42784fa3fc32d922793a14991fceabea060822663cb1b174760bc54a6ec63ebecdfdb08c1de8b3666fd4e69bb6f58", 0x5f}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="240000000000000029000000322fdcae57d386a9290cef86000000fe880000000000000000000000000101", @ANYRES32=r1, @ANYBLOB="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"], 0x1c8}, 0x20000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d8f2", 0x10, 0x83a, 0x0, @dev, @mcast2, {[], @icmpv6=@ni={0xffffff83, 0x8}}}}}}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000540)='\xd9\xff\xff\xff\x00', 0x1ff) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000240)) restart_syscall() epoll_create1(0x80000) getuid() keyctl$assume_authority(0x10, 0x0) pipe2$9p(0x0, 0x0) 15:38:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:19 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:19 executing program 5: 15:38:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:19 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:19 executing program 4: 15:38:19 executing program 4: 15:38:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x28, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:19 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:20 executing program 5: 15:38:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:20 executing program 4: 15:38:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:20 executing program 5: 15:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x28, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:20 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:20 executing program 5: 15:38:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x28, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:20 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:20 executing program 4: 15:38:20 executing program 5: 15:38:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:20 executing program 4: 15:38:20 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:20 executing program 4: 15:38:20 executing program 5: 15:38:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, 0x0, 0x0) 15:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2b, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:20 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:20 executing program 5: 15:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:20 executing program 4: 15:38:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/236, 0xec}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, 0x0, 0x0) 15:38:20 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, 0x0, 0x0) 15:38:20 executing program 5: 15:38:20 executing program 4: 15:38:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(r0, 0x0, 0x0) 15:38:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e3656"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:21 executing program 5: 15:38:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, 0x0, 0x0) 15:38:21 executing program 4: 15:38:21 executing program 0: 15:38:21 executing program 5: 15:38:21 executing program 4: 15:38:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, 0x0, 0x0) 15:38:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:21 executing program 0: 15:38:21 executing program 4: 15:38:21 executing program 5: 15:38:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:21 executing program 0: 15:38:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 15:38:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee4920"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:21 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:21 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:21 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee4920"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) 15:38:21 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:21 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) 15:38:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2e, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bd"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:22 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:38:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:22 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) 15:38:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2e, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:22 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:22 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) 15:38:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) 15:38:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2e, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:22 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) 15:38:22 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f0000000940)='./file0\x00', r1}, 0x3dd) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@mcast1}}, {{}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000001980)={0x7, 0x81000001ff, 0xfffffffff, 0x806}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'blsf0\x00', {0x2, 0x4e22, @remote}}) socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000540)={0xdf8}, 0x1) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r4, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r4, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) 15:38:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2e, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 15:38:22 executing program 5: socket$rxrpc(0x21, 0x2, 0xa) 15:38:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000000d}, 0xe) 15:38:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2e, &(0x7f0000000380)=ANY=[@ANYBLOB="b7000000000000003c000000000000000f0100000000000095000000000000002407903679fae9146a2aec7f87c6c3711e1806732d9bcc66442028d3cde3797d8205dd550f16122a29708deac0d1e50432472ff871b86c2e951d518c85c8c7d9126718e375d459e80bed609fd627fa4fcccb36fce3cc286d6e6d22852c67866eddd2d96fa2158b234664dbc2de0b6b9fe29bad1ebf6b132be4f58a854f65b560f76df73c633d00487d66d488a31504c2997250c3435ceadc67e4dc7b08fb4876d2ecd9f9ebf167d39db1887fcd2b51622930964f3dc941873662f983083b177146bd0445732ca9e661dff029c9349206917939bd655bfa23122502353bad6bb14e8d86ca60037f022ea0cfe8cbbf33db1f00875c4e738a9c84b57279f5b277ac76bb4b9ae5827a5d552727b5257244412e136584adf495f453d1ef73f7383bdedf2fd4c3bff8e506cc705819ca1c27735b0d63c7e1089153285cf9e169ba509c92e8dbdb54256e36560c1a9eee49205054bda5"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) 15:38:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x8000000000d}, 0xe) [ 187.609404][T11751] ================================================================== [ 187.617521][T11751] BUG: KASAN: null-ptr-deref in rxrpc_unuse_local+0x23/0x70 [ 187.624815][T11751] Write of size 4 at addr 0000000000000010 by task syz-executor.5/11751 [ 187.626078][T11739] llc_conn_state_process: llc_conn_service failed [ 187.633218][T11751] [ 187.633235][T11751] CPU: 1 PID: 11751 Comm: syz-executor.5 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 187.633241][T11751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.633246][T11751] Call Trace: [ 187.633269][T11751] dump_stack+0x172/0x1f0 [ 187.633291][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 187.674106][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 187.679053][T11751] __kasan_report.cold+0x5/0x36 [ 187.683886][T11751] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 187.689673][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 187.694604][T11751] kasan_report+0x12/0x17 [ 187.698919][T11751] check_memory_region+0x134/0x1a0 [ 187.704019][T11751] __kasan_check_write+0x14/0x20 [ 187.709226][T11751] rxrpc_unuse_local+0x23/0x70 [ 187.713974][T11751] rxrpc_release+0x47d/0x840 [ 187.718548][T11751] __sock_release+0xce/0x280 [ 187.723124][T11751] sock_close+0x1e/0x30 [ 187.727275][T11751] __fput+0x2ff/0x890 [ 187.731242][T11751] ? __sock_release+0x280/0x280 [ 187.740916][T11751] ____fput+0x16/0x20 [ 187.744895][T11751] task_work_run+0x145/0x1c0 [ 187.749475][T11751] exit_to_usermode_loop+0x316/0x380 [ 187.754837][T11751] do_syscall_64+0x65f/0x760 [ 187.759600][T11751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.765571][T11751] RIP: 0033:0x413511 [ 187.769450][T11751] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 187.789989][T11751] RSP: 002b:00007ffd6e3c3170 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 187.798821][T11751] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 15:38:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) [ 187.807036][T11751] RDX: 0000001b30120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 187.815001][T11751] RBP: 0000000000000001 R08: 00000000f644093a R09: 00000000f644093e [ 187.823299][T11751] R10: 00007ffd6e3c3250 R11: 0000000000000293 R12: 000000000075bf20 [ 187.831253][T11751] R13: 000000000002dcb3 R14: 0000000000760068 R15: ffffffffffffffff [ 187.839303][T11751] ================================================================== [ 187.907237][T11751] Kernel panic - not syncing: panic_on_warn set ... [ 187.914010][T11751] CPU: 0 PID: 11751 Comm: syz-executor.5 Tainted: G B 5.3.0-rc4-next-20190812+ #64 [ 187.917061][ T3880] kobject: 'loop3' (000000005298cf5a): kobject_uevent_env [ 187.924772][T11751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.941900][T11751] Call Trace: [ 187.945215][T11751] dump_stack+0x172/0x1f0 [ 187.949536][T11751] panic+0x2dc/0x755 [ 187.953418][T11751] ? add_taint.cold+0x16/0x16 [ 187.958089][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 187.963098][T11751] ? preempt_schedule+0x4b/0x60 [ 187.967933][T11751] ? ___preempt_schedule+0x16/0x20 [ 187.973030][T11751] ? trace_hardirqs_on+0x5e/0x240 [ 187.978037][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 187.982958][T11751] end_report+0x47/0x4f [ 187.987094][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 187.994104][T11751] __kasan_report.cold+0xe/0x36 [ 187.999325][T11751] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 188.005313][T11751] ? rxrpc_unuse_local+0x23/0x70 [ 188.010235][T11751] kasan_report+0x12/0x17 [ 188.014636][T11751] check_memory_region+0x134/0x1a0 [ 188.019770][T11751] __kasan_check_write+0x14/0x20 [ 188.024698][T11751] rxrpc_unuse_local+0x23/0x70 [ 188.029459][T11751] rxrpc_release+0x47d/0x840 [ 188.034039][T11751] __sock_release+0xce/0x280 [ 188.038613][T11751] sock_close+0x1e/0x30 [ 188.043287][T11751] __fput+0x2ff/0x890 [ 188.047252][T11751] ? __sock_release+0x280/0x280 [ 188.052091][T11751] ____fput+0x16/0x20 [ 188.056317][T11751] task_work_run+0x145/0x1c0 [ 188.061238][T11751] exit_to_usermode_loop+0x316/0x380 [ 188.066597][T11751] do_syscall_64+0x65f/0x760 [ 188.071188][T11751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.077063][T11751] RIP: 0033:0x413511 [ 188.081051][T11751] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 188.100935][T11751] RSP: 002b:00007ffd6e3c3170 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 188.109330][T11751] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 188.117289][T11751] RDX: 0000001b30120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 188.125241][T11751] RBP: 0000000000000001 R08: 00000000f644093a R09: 00000000f644093e [ 188.133281][T11751] R10: 00007ffd6e3c3250 R11: 0000000000000293 R12: 000000000075bf20 [ 188.141233][T11751] R13: 000000000002dcb3 R14: 0000000000760068 R15: ffffffffffffffff [ 188.150500][T11751] Kernel Offset: disabled [ 188.154828][T11751] Rebooting in 86400 seconds..