0000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) 07:57:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:57:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff001, 0x8001}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x70}, &(0x7f0000000100)=0x8) open(&(0x7f0000000180)='./file0\x00', 0x800, 0x153) ioctl$TCFLSH(r0, 0x540b, 0x6) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="e8176832ed35594d7584964dd600000093c5c63a94794ffb271b981a35fb7c79d5814e0843e3015808aec2673c3ad68f8baa7327d00df360874b0a56607005bc62cb6077a8fcf7697ab7e95bc7e02325aa9bec217de55fdb5121f772561c474a73b708b20f6c0c59ba36cc9ff17be373cf6987177ccc149db816b8324303e643304474438eaf1ea121d3496ba5aacca4ad9837c086f20477d58c79c5f4a86b6efe7584fccefa3d12d200ffdad1b719def9e0f97776a7898add72dbd72d3af5d747383059edc6c2fbb3983973efb0283a00"/218], &(0x7f0000000140)=0xde) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) 07:57:44 executing program 2: 07:57:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r1, 0x4) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) sync_file_range(r0, 0x65, 0x7f, 0x3) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x3000000000000}}], 0x1, 0x0, 0x0) 07:57:45 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:57:45 executing program 2: 07:57:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f08000180000000000000000000000000000000000000000000f8"]) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000)=0x45, 0x4) 07:57:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000001440)={'\xff\xed\b\xa0', "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"}, 0x1004) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x200000000000000}}], 0x1, 0x0, 0x0) 07:57:45 executing program 2: 07:57:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1000, 0x180) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80040800}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="08002dbd70001cdcdf2597bb0e47eb36b7f0846a0a249815327af0c34b61000000160000000000"], 0x28}}, 0x1) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$VIDIOC_G_ENC_INDEX(r3, 0x8818564c, &(0x7f0000000ac0)) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000240)=""/9, 0x9, 0x100, &(0x7f0000000280)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) 07:57:45 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200003) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x8, 0x40000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x20040000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x10000, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000001c0)={0x8, 0x8001, 0x0, 0x81}) 07:57:45 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:57:45 executing program 2: 07:57:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 07:57:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101001, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x40) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nfM\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x202020}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x2ec, r2, 0x700, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xea1}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xaf}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @loopback, 0x4c}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000000}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8d25}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1ab}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_BEARER={0xec, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'eql\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @broadcast}, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x0, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x8, 0x1, @l2={'ib', 0x3a, '\x00'}}]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) 07:57:45 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:45 executing program 2: 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x2, 0x0, 0x0) 07:57:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 07:57:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x24b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r3, 0x0, 0x0, 0x80020003ffc, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) 07:57:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='::.eth1los)\x00\x00\x00\x00', r0}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) wait4(r1, &(0x7f0000000240), 0x1000002, &(0x7f0000000280)) 07:57:46 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept(r0, &(0x7f0000000000)=@nl=@unspec, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000180)=0xb) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0xb800000000000000}}], 0x1, 0x0, 0x0) 07:57:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x8, 0x0, 0x0) 07:57:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00f0ffffff0f00000180200000000000000000000000000000000000000000002435d7a406799e5246b47f6e4588c1bb838ba32a82077351cf9c896ccd40801cab1bab12b3dde9511fdd9d2b166a1624b8462a65a55ab3426a14661a4cc8025710b3a53f8c9bb1caab0b917ffb894154ad468fafe7fc1a0c61b42e35ef407726b5680381ccf724c872046743ec6e83e9e53dc02dd4580b22335ec4cf847719e2d98f6e0d2ee27d37fabf589eb37802a42452b2069180c6d8b1943307d94e8445fa76b667691a9b15e538174a20b563ddae47560b390159a73d2984f137c402a1b13fc063d8088d5b8dac70cdf61c1ebd"]) 07:57:46 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:46 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000580)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000440)={0x7ff, 0x0, 0xfffffffffffffff7}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getgid() setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, &(0x7f0000000100)) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) write$binfmt_misc(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="73797a3013709e6d31986a60aa1ab9d629ae13a1d7162af6f4101bceacbca119f76520875649f2a71cd413a2fcf956be8e24bc262f69606c53fa48546cf5a5a52191daef362df5c9d5071f9e7fe1cbd0ad196d9035bd12bee5f6fe414cbbe6c6c545096f5a08dd18e46bd8cbf04f33719bc392b74ddf4af87cd98508f897f628320ba396f700f55b9231aec399dbd1ff28429f66e9844b38cb2990beb0e271e12ef08b5a1be40ae661b3992e308b8d6e2bb31a5ef81ec31f401b7daa8c918593653690452e11d5ea6e3432680456de1251a1fd89e51088db9f6f947dacb5d8812478a8e291615d96"], 0xf5) socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$xdp(r1, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x7, r2, 0x12}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000180)="e2235e15da308d0604e6539762d85fc57063db16155494a39df0baee1b2d16d20890896bc434ffdd48806a3d4b0c7848e0777292480fb7edce55d1dfd03e98f501fb6c4403ab602204742a0c65b0bcc4f8848dea54195dd944fd115ef22916b472d00740035dc4fc8c5e0493f210f421b4e1133fbfd79faf392ca6ee52becae8d1979debfd952919f14ed963aa3c5dbbf073", 0x92}, {&(0x7f0000000240)="7418790a1c98c6a34cbbe2d9b1a3b6339ddaaef341a86fda830035c5e18658d539fc961279b638b8e3b08737f3c8690388267020011673873f4ad849287bda60950a6f99fef9792f783603bba9ae257e0019e3724a21dc21e67d8eb67e717ce25dcd9e7eb62a7eea689ea38972de83b41a9ca9b4fe4228610161a0db70adacafa024c2945fd676bbaad8153b84ba5a8b45cd19846d9512f3cd4f4c546bc05b801f5c231d6e2f4260d8df122fda79c114b9351ab57a82b15a5146ce44ce8bd4581e768ac9e29a5c9e8c6c7a28f8c6540607a904d293102c394e421b7259f10bcff02e9208a3d7197ef70346191587", 0xee}, {&(0x7f0000000340)="a157b29c4d839a01a5c704dbe9351acee4a79a7485d30ea359b5a4c7648c2923102f748a4a2c974e96f9a00dcf311020bd7169028894840dfdf1f91042befe5e048014c8208673139b8fa915cc4bc013999762f83e3dcfbdf63a5db432a07260054e1813f5d4f13e12ad02c6acdb789e554c4391d6f0106353c96f5cc67ddfca409b4ef00ccd45fb90d4358faebbc43616660fde87a00242ca9a301af67bfbc0c9ec2745e84cb5ce39faa8ad5d4b07", 0xaf}, {&(0x7f0000001440)="c4153132c3c96fcf7dd1f83ff0982b1bf56014ecc5033ca55960a2b438b0ef70da92c12101fbe328f1a3e36605e5247a701d7afd35fd51dcde040fdca89aab46f48c822b5950214babfcc4b540cece771373e02226f740e3bd8ca7d0d0c49c6fac837c1dc232f7a6c37020ece07af0e81cc581eb83cb68513931b1b9a687fd542d86e83d55ad0308caa74dd28fd51d49cf6d967aa5792eb1d30c4f02959d0e3eacbab772443dfb6d264601c9e1e92d8be63c5ce97a2d78e7aef5de20148bda106ab0da9921ac21ec5fa57de078524c498dec00b174119918abf6b59bb7dc6153140428c4b1f582c8c7fef9b143eba6376826510fdf4c1a13c3abf45710052f62ea20bf18c5ebd2f4a456d2db4c2064497fe6f252194157264def4edb9cbe37aad21fdefe5463a7c51737e456ced45aa46e1dbb2222639bbf999f4f930629a7b9da469335a80d138d61985e9a2176b32fb4899f76f9a99c75b66c5745d59cf2ebe542b541fb050a6fbe364dbc8a06df51e92e34d76e08003c754f45780b5605bacbb7222077ef45904a0086b8c04f8bcfe83db2228b98c87661bcb31dc3be6726eda6871572a9bf48c75ace5db137f4c0daf93e5174e904ff480f7b1c97c591c7006b106a8cd3e21daf1282084424bb4f9ab4dc71e8b7a6c1f92ed78d0035c4b64b158085bf71039329eeb4b4fabb5d751b358a9bd84c842cde934ab9c5dd82092fa76421ccd68678c8f54b67b816544776e0f4b056d798d4bb50324a7aa16ca7db56d702b66c0bc783146c2ea5dd5a859adfed24fae537dd55c6f2a88ce53b6982f5bdbd64ecfeccd9901b4a53cf16ceffc3934804e108bc3bbee4651af8ab7845e5bc623f69791947afab48dd00b8e84bf92e7a4538aa63cf60eb866c7976bae4ab4f36d25231f2df59b54b5e2fd175d745b4571dc9cc249559dc2e526b967f5c6a690c72ade374722671f4ec91357a99cdc9ad0cb28c7cd56f2b9e214ea6a143571700836c8fc77069fc5c9788aead8c81579336f4241c4e60cc28904179e8d583f1321febc07169470166631d7f9424e19025feee23d6a078f04a5109f90930d3a8ced9d3b9ab72e05d2ba3f26868458b90de4e45bd346da71660f29227bef75179165c77c4f77a3830ab9dc7ebfa93dc084b145085b6bd38b0230b07306f8ac3a39e1a7dadffdb4e783693321ca390d3059d097f00c178cee72b50833200efbedb5834d7d6ac120d9a30857f422b5f3837d5a3968fc708958a480614aa8b082af882deecfec29ab3b6b95bc61de4d89fcd72996e11cb922fecbc7405e9abbc6a7b5c6431572dbcf3f3fda4069b4a09fbe063b50f2299e1ca6b4690df7c1bbd4f0fc4b316214ab2222bb5a501a090d0782e860984a80416b6e207b29c427a65aea1ce827c856e1cd4188c781b10612687a57dcae861212d1c65c424ca446c3babf602cebe36ea316ed5a28146c9d4036e241db8ddd302bbeefcf5f134b968d456f61db231626c47efaf5a85aee1c273d4c262cd0338bd2651c631e1617d37101362c8bc17e3aea472ecaadf687c4ca4145e7beb9fa98c9225083d13163b4c4af4f4d17390f8c8b6c4359f42a4caa9e0e46e3130cdab92fc455715d2f2261e82363aee41af5d12db75c33025609a456af54ef36715c953898d5c439f9630a0da965d325f973beb5bad7a3f8c8bd4e86e50b37f3e6ced92eca0580ef6507fe12fc55e20cc2f286a488c12494749c7c715ebca54fd5d7af1ab9da9972f1bbc853b20af01d83b77885dcc014037831219bf1905bf984fa01ac8f8036bf80e9b6dcc8f94182aad5dd4489e1051555a45dd3a045903b45b3a0c595c0df7f028e80d2c1b6fa88947a5446bb84a937da0e246ea2be92c12d64db1cd1418409bfe96b6456506e24d8d74a10528b7294f61f5a219a03961b6dfed842695bc3eb3d972ac1f4de3374fa44a1c6cf050ab307c7f81d7dbd2431631c5656fcc2428316963c2fa5afacba8f4c525ca2df0f5dcbdedbafa8b814e3ec6651b4b8b99ce3755d024080e9469701515a4a201c4ef75bc39c073df3366b25f58b3b942d9cbc2bf8bc3a749a9e7571519009f86d1de8d387cde19679b02b75bf631ffd3d4195df2d5d0f20e6ea841fb2014a56157045e4d0094240992486fe9060ab74a897646202fce843a766af1ef7c5c0ebbf6a8729358a569adf249274d463e9eb3e5a131d276022c4ac90c1ad6a6ed2e8411b2f990b9b8865ba1792d314cbcfa4dc0fd2fc01a47f48cfa6ca897456a85e6a0905cac60bd3eeae2d0caafafa1be6aeddcf493ce314e0fa3081fedca1ef2fc373d857dae751b436a9b1523a7060b68e542e0e9e554d7cef88474799d0d551f26a9d6132bd696bdbcc8cee1b2eb76915fd2565af5fdce5c543d6622740a8d38367837b4a17438678a80081aa1a7c9aa3fd806b10884b568b1a7f6aa280f78efe21b6f8d696ca7157bd9b403a71646f79ba3d1b456ff145455ddb1146ed1a7c303fa7af7373fc64101d5be0a4ea9a201a4f69b8feddb2b823bf1e0abd561b7328a16011a099e1f37bab4d6de8268fc66caecf9f174886bc7cdbf7950b78fcab1fc2cebf99a8beef79ec66a94c7518bd81c41cdb615f4d8355c79b4a5baaa89fc8ef88041dada61fa4c92bb48b20d638952989ff8192c4cd2020d7e2783f740cfbc43363a710836a713576359f9247bfff427656d8ada908aecf3e3bb6712bf56fc62e2c230cf7fc1fa0a5bc22a6b216e5fc1a86dc9713b9ca00a564382b7142ebbae334cfc0e9d07bd0a1d53a69b9f4977e951a960c1c21c9fd92452370d981a556f548533df5f88abc8d8bc1098db9c181385d24f64c7a1e123ce7928724336ec7861be6e518b96a393a41730ba5d40923b4f4a1b404e5baa72ebd3aff0ab66f11ab3d45060bb5ee8ed51395e8ea491fd4cd68dddb0e8c81f11caefdf21efcd45582575d08def06ca841a6f81b7629fcb5a1ec0c98c995c9fdfc28ba96db3e2dc7b8ece4a3afe6b7ecc63baaf72f41273d419b0105e14d7643d8238a5c0c95931c42cf79d82d93f1c295bc56522ab2571ed15ac3d9e53ffb42d2d0a4728a88cb1edb71e251135320319253077626080532b23fc0a245b7a2ea3a2a12cb052c2ffbc6d082a085c1e6d6bb905e54121010ab042017d4a1e4010ddf8e8729898d687fc67ff1f7c042cb8b5fdcc5942767d5c365939d90bae570d204175c966b70146ee27b1a9e522846ab00480659f03a30943d356bb3caedfd409b51821bef393b9caeff1bf54a7d8dbb28c8c7b799beb3ef7ccbb5805c86c05df987948d77e86ad6dda3ffa85c663a1d314710625198b71160c7c75e5e244e37b998941297b669a455256008fce9a315dea10354b6f58d9770b7ba975bc3a5c5e77381b67a47e2975ee224e2f96cf8c3b1c04a1a12794462ab6a07f084aa7ff957a135430d3a8525de6af382b95f1c61ec2f55bd200c5cd7fa3cd13fe4691abb8bfdfdb015fee78d46dfdd66c1ea80ce9eb54af8f39a45b9eb4873477db5e2beb923dfd2511de4441eab30ab3f231987437f10ced988cfeed6af2dab006f1209c7064df199972e03ff9890959cda86168e26be1ead417c3ee5cf122e482c28ec0f387387acebf513c90d06459446ceaf15c5cb4c0076a7d0a7350b2817146b20005c39a1394f05b937d009bb78e7435dd9ba8112374969a324029a4c127a7866f4d3de3495c0603d3d57bce007b85d88793c9439e690ea1e9906d964eeb780d1d309901e0b260738c4c5cdb64d4a528ae97d6c7c0f8a1cbff03ccd236f7b5e1562bfb26906f6cec6ca0872e6f0e142b1905fbcab7d09e02711daf3bd18734d088a96b620eb5dd415b4eee081269c45d0f726e51d014d2c391847d5ceb4383e58e22911579e96b69879551090eb7f88886b0f85fa84b82cb59ee27515db3a65fc67e7e1ab57a4a7ab50c8f030fe20a0b45cce8c73f99ed9e033c03ae65d3fb4b030a0f1c33acd3d331f686f97e02ef2d48c6d9c9597bd86f933d0d1b829a5449e2dacff44c978f66e40a93ccb7ae29fbafcc5f061090f027b5cd560c490f9b947653650ec925ba85c1e4e90fc64591588bf0b3dde7ed6549d72990b77ce04f8e8ea0b487373122d891db50c23d26c62b99a9ac139cccf1583f48a561a4d1da85c027e0ad4646a50ea63ffd5298999989f6c831203f1be183f9e8156c11b4f290c5a34624461d6be454c71e3f0a6cb991bb99deb7d1668f554cd7f864c44cc623d5478ed5f64f3d48b2b3d3adf3bbd0be0193c3333c0d2f961f28155a54b6b68e0299042932519de0b1092652e64e7ac421bcda511b7b48ca1e83208e4aa18dc3ca25a8e9262e12c10b01136fcd0de0e53758ba9e55d7077188b82bfed5dd2edac085c4feda37c01a594747c10db433c880d4e6bc8dd9957dd1d7e443d3a8cec66c14ab789f837030203fd6afd9f2700477e23550e3e1e9a9e1b206cd9189d4524c12282daca63ea1d9a78eeafce8ca41eaea54758fa1af2d4ce18dd13484d9c6305d43bfa78d2785d540e35df01906b82168390321dce0d84ed0e3bf79402009d634ac7b7c461fb45874b616e8968c79238fe7e48e54bf5475c25d6c2a8279d6c2549abf6932d91ca2a8b25d396a7474bbab0f4ece971b3d4b7e860aa4a89d27e9fcb953a2a9f99b36a757856968e1d093fe64bbfad1530efd6145f8da1b1f036e8d1ee806f8bca4180d8b32f80eff9c35387678fdf9f2a346895efeb350f26f07c96e3388c1408f07dac23ab5cd66b58bb9e56c495d031a088199a475b413f947ffee9b36d7534b8961daf425deb3139354dbeb118c21746c23ed3c83d53e740e86fe68fcb6b41aa068ac84d081b61d1825dc82a88415d2dfe7c211855031ad1bb9dfa10c1f089338dfad447f5d8088939064544f98b4dd522b4c2c6c8bad7d0c86770229dc62a2bc38dfaa050b98abf989129368e28ff6dee82b33f738241b19d7171e16b12d502fc5849b93f1ae137f6e67378b5b8a1964470a572e13ef349c9b59559574a6c17d49d01fa43d3193ef1a1df96f842cf2844c1468395bf8a673da23abd965b6a7d61ca14f6593adda9c4c44f04f964e097b1071507fbe32d4e4c40e6cc73b41a4571a3651ba840ff402cafcaa41b75760b71d3416f06b5c694e90e318bee73db5232ed37ff3f07835b5215009167ea172ceaaef2495b3a17d383b3d021a234e2c757f93bb4963ba76cdc825544004283dd3cc668162ff5c77a2dc23b6ba699f6f1a26a9d0c5b819b28101766c7aa19cd96a1c2281ed4e24ec9c3e0803d7c0c8d41c29db261fdd8f256041d65ae312854454c3067133d95de5be22b6be3aa784699d6cd3281bc1790f056e4da7bfc5de7931bd97b8206cb7df70c32e0fc4b3e0605a48a5fa7035cc109dd59f7a31754cf59160084a5fc44708c89b969a3f8e3884673b63fcfec6d41c365abfb2ff98ba2b6a3488ccd2de696f2f370cae2329b3f0b22e6dabbaf333ed80f313dc04e2788d22de24daf957abf8f0bc1e9f543a538d080ea29d7fd23bf067b34cdde911f63b176827ae9a13f3e7c3d40a5702d323ba7f5adde7339450d7b6afb33bfb0cc795b5d37e470b3cd2c13f3bfcad158193301795061c4fc8b4e73088496d14bd83a7f0b3cb1e84d9b260b1709dad43ceed263a4511485fa061b74178291a90f93435f809655ffb5d529dab5faad311982d26ad0148d7f2eaf6750a9aa45f434f796350607e58784d6f95c9e51059c6c8591659df021716a0f54a6fd4187da77990328ba7751186", 0x1000}, {&(0x7f0000000400)="9715d8c9579417092e700b0d55f8704092da2ffe7ccf84176d936e5a3522e1eef34d79d6632de9eaf1eed01cbe80f2e9de976f9809ae431738bd859cbfa928cf89d948a850aba4f5d6f3fdc8182beb9b130db68d23802dd7da1c77dcf97779afca8b5e2543a0b9cc57b8b78c4147ee903408c55aee50dc9ecaf1aa5ca66669349bc41c7b763db01fafec2438cb1b30d58c3be63d646ce24b4e4bacf787ac31027714a007555272a7d6c432bf0efd0f6782027ab42ce540bcd12a6aa6fb001e9af27f7a443edf26aab48cc5afc2b6d31f66d0b3ead83ad500", 0xd8}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000000500)="86a29ce28a8ec2c84dc0f14780febe8f09c93e568c87950fcdb9a1e94ce07b36b2d239c541b60cf4fa18d9a61986ef8348d547f8aa7d3e44593ae7445babdf0352ae168884ab09de9e9c9423f3f6108854601ef5d324c0f2d200f9f6bf165d72b3d9a44c7b5908f9e96f4f7ddd647be24ba2", 0x72}, {&(0x7f0000003440)="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", 0x1000}, {&(0x7f0000000580)="e906e2b2a8669552a2f69deefafccdbf954a954724d8cb40ce5ca8c64df09fd7d32d875ca4e1043c3bc85c4233f21cfaf20472f9e5a20233f83cd1a92b3d2440ed747c5ab1eb6a6366d7576e958f99185a56a1f8dd3cdb338f79734350ef159cc21b94355029c09dcb57f1b25e5125d3df00217dceda2d3b6cb79624b6d51448b08e2e16e10e704a412eccb7f7ad16e3bb22f2", 0x93}, {&(0x7f0000000640)="4f6855ff6408fdb8c6017b7e0c0250807c9b6bff95220c7b15c447dd19210f9cd6a7205553ba2de567951f61d7fad072e697fbed9a8c48593ccf78d7ef6b53d3e6118fc8d90231aacf5275906f2f1d5f5165011823a6d5c53a8c46182ec80ef570a8dc6461c5c768fab7c0b1ffbbfa562e1a17e8fdf1b53860826fb27da37dfb9ad3a95fb47e49161ee1fcaf4dbd5b2207c1d9bb015fedd8ac04a09a9ffbafbc65e5df88c9a2aa1916070f049f9483103769e8b01ac7c6ee3b71c52fe9fac843d5ae84", 0xc3}], 0xa, 0x0, 0x0, 0x8010}, 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x8000, 0x30, 0xa5bc, 0x2}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x8, 0x0, 0x3, 0x6, 0x1f, 0x8, 0x7fff, 0x7, r1}, &(0x7f0000000100)=0x20) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) 07:57:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x1c, 0x0) 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000040)={{0x0, 0x7530}, {r2, r3/1000+30000}}, &(0x7f0000000080)) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x4001, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) 07:57:46 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="5cde27eb05b7566a6e6a17ef1c09e48ddf52c1bec1b8b36e73072360247e70dbc19c95bd54cd33f83e3079e26390df5eb36e070b35e8b245710fc43a8b7cbf67917f42ab40be7de15b58a5cacef28b5074e6d80f61178e0a9cfe0555e46c6835a3ce1614e1dadc674c2c"], 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x0, 0x0) 07:57:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xd0, &(0x7f0000000200)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x7}, @in6={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x43}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x3, @rand_addr="2df0e0a8cddb1bb864bdf6db09e92a60", 0x1}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x10000000000000, @loopback, 0x2f}]}, &(0x7f0000000040)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000300)={0x401, 0x8f0, 0x9e, 0x5, 0x5, 0x6}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @multicast1}}, 0xb81, 0x4}, 0x90) 07:57:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x1c00, 0x0) 07:57:47 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fffffff, 0x2}}) 07:57:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(xts(twofish),cmac-aes-ce)\x00'}, 0xffffff4e) r1 = accept$alg(r0, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0xfffffffffffffe91, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x400000000000000) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000180)={0x5, 0xfff, 0x9, 'queue0\x00', 0x3}) 07:57:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x100000001, 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x840) prctl$PR_SET_FP_MODE(0x2d, 0x3) 07:57:47 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x4000, 0x0) 07:57:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) 07:57:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) setsockopt$inet_tcp_int(r0, 0x6, 0x3e, &(0x7f0000000000)=0x800, 0x4) 07:57:47 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000500)='.\x00', &(0x7f00000004c0)='./file0\x00') umount2(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r0) 07:57:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x1c000000, 0x0) 07:57:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x23) 07:57:48 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:48 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x28200, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) userfaultfd(0x800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r2, 0x9}, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="00f0ffffff0f00000180000000000000bdc09000"/35]) 07:57:48 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null}, [@remote, @default, @rose, @rose, @null, @rose, @remote, @default]}, &(0x7f00000000c0)=0x48, 0x800) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) splice(r0, &(0x7f0000000180), r1, &(0x7f0000000200), 0x3, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000002, 0x10, r2, 0x10000000) 07:57:48 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:48 executing program 2: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x40000000, 0x0) 07:57:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x3f, 0x4) fcntl$getown(r0, 0x9) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f0000018000000000000200"/32]) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x6, 0x80000000, [], &(0x7f0000000040)}) 07:57:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x1c00000000000000, 0x0) 07:57:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:48 executing program 2: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:48 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:48 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/93, 0x5d) 07:57:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x4000000000000000, 0x0) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xb276, 0x200400) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x1a0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0x192}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@multicast2, 0x4e21, 0x1f63, 0x4e20, 0x8000, 0xa, 0x20, 0x80, 0x2f, r4, r5}, {0x80, 0x6, 0x3, 0x4, 0x8, 0xffff, 0x9, 0x80000000}, {0x100000000, 0x3, 0x1f, 0x20}, 0x9, 0x0, 0x1, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d3, 0x7f}, 0x2, @in6=@empty, 0x3502, 0x3, 0x3, 0x100000000, 0x7, 0x5c8, 0x2}}, 0xe8) 07:57:49 executing program 2: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0fb219c60a28fc4819f60000000000008d77000000000000000000"]) 07:57:49 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:49 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xec, "49948dbf4e8f16e2c91dbfc2dc1818d732c5388dae88f2e01a04d950c13a17c2e5740d66958bf199e67ea0950a3f4fd1e39b6f9ba3d5cc7672fae5048e608517d96fbfda56a7348883e8cdfcb48ecf4d4c4e108ea75d0b07fa4ff3319f648115b58cd89158dd0ecd469d4e64b8484356a2928229c776b831172d1543a1cc327dd22029a07ee76991df531008a735738753a45de1a1f9158f33deca68d7a29bf48de80c0a01c76bc7ad9f3106680ac3030e3644ccef5af78fcc5d805887e673498fd81987d58087bcee69e56e44686c8b21715445ae0e47b13599f2ac00ca76be327c6a174e383518a657003b"}, &(0x7f0000000040)=0xf4) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={r2, 0x69e}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9c, 0x400) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 07:57:49 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x303400, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0xaa000, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='mime_type$trustedposix_acl_accessmd5sumem1\x00', 0x0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0081f31a7e1eaac9dd8000"/27]) 07:57:49 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) eventfd2(0x101, 0x800) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000001440)={{0x7f, 0x45, 0x4c, 0x46, 0x1ff, 0x4, 0x1, 0xcb, 0x8, 0x0, 0x3e, 0x7f, 0x41, 0x40, 0x15b, 0x7, 0x8, 0x38, 0x2, 0x0, 0x8, 0xab}, [{0x1, 0x7f, 0x0, 0x7fffffff, 0x81, 0x9, 0x8, 0x1}], "29066f72eb4d2bb116a810aa792c8fd33fb8ca4cdc2d07a7d0323b8c8a87026f55f78ce4d10285ec3cabf296b7b952e2c504ba0a9318382a5bb143b993ad9042d3cdba2923171a9d4cd8a626ca448c8116db100fcd14745ac02b836eb55b988469feec6a17d8d0b04d623c333a69f560552dd5b802e00a38", [[], [], [], [], [], [], [], [], [], []]}, 0xaf0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x20) getsockopt$inet6_dccp_buf(r2, 0x21, 0xf, &(0x7f00000000c0)=""/77, &(0x7f0000000140)=0x4d) ioctl$TIOCEXCL(r2, 0x540c) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:49 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpu.stat\x003\xbd\xd5\xfc\x95\x9c\x82L\x93\xd7\xa3\xab\x1b\xc0\x1b\x80\x89\xeb\xe1I\x90\x15\xb2\x00!\x1f\x0e\xed\xe0\x92\xa6\x8cy)\x80.|}\x1aL\x9f\xe7\x13]\x1b\x143\x1c\xb6\xba\a\x05\xb9nWu\xe9\x9a\x88\xda\xe3\xe6N\xc4\xd0\xa5A\x92{a\x85AJ\xdaJ>7\x12-A\x19\xebY\x01\x8cA\xe6\xa6\x81\x8a\x983\x10\xcc\x82\x12\xfa\x10\x001', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) msgget(0x0, 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)={0x2a, 0x4, 0x0, {0x4, 0x2, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) [ 496.972122][T10233] cgroup: fork rejected by pids controller in /syz4 07:57:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:49 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r0, 0x20, 0x7, 0xffffffffffffff79) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x14000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8040, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='meYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc2\x9f\x01n|!K\xb0\x15\x7f\x8f\x05\x1d\xca\x01\xae\xech@6C\xd2v;\xf7z\xeb\xae\xa8\xc5\xb8A&\x1a\xd2([\xfci8G\xc8\xe0\xd6\x8fB\xc7)\x7fN\xe3\xcbK\xbe.?,\ap\x89\xeaw\b\x9d\xe9\xd3F\xbb\f.\xfd\xf9k\\bQ\x12W\xea\xfb\xf7\xa1{\xcb.!\x03\x1b\xcb\r\xab\xdf\xee>\xa6>x\xcfJ\x03\xe8\xf1x\x95\xb5\x97\x8d\x82\x19\x8b\xf0kfJ\xfd\xbc\xc7\xfa.\xb8\xaa\x04\xeb\xea\xa0\x12\xc4\xe5!\aV\xf7\xaf? \x9b\fKw\xa2\x8d\xae\xf8\xcf\xab\xce\xe1\x06k\xef\x84R}Qv\x90(', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYRES32=0x0]) 07:57:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9c, 0x400) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 07:57:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setfsuid(r2) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) 07:57:50 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:50 executing program 5: r0 = dup(0xffffffffffffffff) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000080)={0xffffffff000, 0x8001, 0x0, 0x0, 0x1, [{0x800000000000, 0x63b2760f, 0x5, 0x0, 0x0, 0x80}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x80000000, 0x0, 0x1000, 0x8001, 0x70}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000200)={r2, 0x81, 0x4d, "78365db210fbbacbf57273053d57b9081fcab3d95901485122f06f1279c6911ed407331dddc25124f17eaa8c5796c3fb659a00d5c8e3b3188937f7015475db4e9159b968a1487817aa26ef2d3f"}, 0x55) r3 = dup2(r0, r1) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000000)={0x4, 0x100, 0x6, {0x14, 0x2, 0x7ff, 0x8}}) 07:57:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x4400) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xffffffffffffffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={r3, 0x7}, &(0x7f0000000180)=0x8) 07:57:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0xfffffffffffffffe) select(0x40, &(0x7f0000000040)={0xffffffff, 0x5, 0x80000000, 0x219, 0x5, 0xff, 0x8001, 0x8}, &(0x7f00000000c0)={0xfffffffffffffffe, 0x2, 0x0, 0x2, 0x0, 0x4, 0x7, 0x7}, &(0x7f0000000180)={0x3, 0xffffffff, 0x3, 0x72c4, 0x30, 0xae, 0x8}, &(0x7f00000001c0)={0x77359400}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e20, @multicast1}}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 07:57:50 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9c, 0x400) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 07:57:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xff20, 0x200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 07:57:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f0000018000"/30]) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) 07:57:51 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x5d) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x2) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001440)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000180)={r4, 0xc8, "4c83925e5cf7457839abc995fca519f6a8c12142910cc6561ae35c2a7d409a94204a842b4b75ac245672e3b4bfdea31199bfcfdedaf7980fc8e667bbe96ac0fc8a5908148cd19a8c62aa0a85c61aa0383c057fe3b27be7e6c52b0f320100c19d2b4c460a211a177d8f27653a3a49838b0584388b1a0364c3637d66debe72010ce57d3f1c68d6944cb3577b80c609f36e1d62a00d363ec30a21b6c26f8f61826748a71d0a21d1ec8665175568d92ed81c3000e0fda75a6289bfcea4042877e311709a0516fa4b4f18"}, &(0x7f0000000080)=0xd0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x80) 07:57:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x32eb, 0x200001) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000280)={"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"}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x100000000000009f}}], 0x1, 0x10000, 0x0) 07:57:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9c, 0x400) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 07:57:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:51 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x41) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x103202, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:51 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x4) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xef, 0x5, 0x0, 0x12, 0x3, 0x9, "bcbfd2b28bcfe0d52268ebe35c884347e40347442b626ab1acacf68867518f98977be21fb90fb5f8134a15855eab8894dd35680112a319c2594139ebdf63b162", "1c995c76aec9ffda51f884dfac350ee65512b995b16cbd6d15dc1f6fb7b90d5b13fb0470116aa24e24b7e460a1a02e7842ad643e32728f671b1980a59f7d8e08", "4cd6c7b82bef86abbe4f8d8508cb3cf4e81923a3ce6a187e86ac6d4b92adbd15", [0x27, 0x2]}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/32]) 07:57:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.syz\x00', 0x0, 0x0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, r2, 0x0, 0x70bd2d}, 0x220}, 0x1, 0x0, 0x0, 0x8000}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x8000) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000040)) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x6, 0x1, 0x5, 0x10001, 0x8080000}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000200)={r4, 0x6, 0x3, [0x7, 0x1, 0x4]}, &(0x7f0000000240)=0xe) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:51 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='fcu\x87\x02ent\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="004a01000000000001800000000000000000f016000000000000000000000000eb496737cda62f434ac8e0eb87c28d23290f8e97182a64578ee8521730bb1c5556065a081d03ce9ccf838d587a77bd7ee236fdfe7eb2f9a362"]) 07:57:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9c, 0x400) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 07:57:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) write$vnet(r2, &(0x7f0000000340)={0x1, {&(0x7f0000000280)=""/148, 0x94, &(0x7f0000001440)=""/4096, 0x3}}, 0x68) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10040, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="030000009c0200080200dd18bca09e199cd8a61d05615a4c0b46006d011e32dbdf789761cd604cbe76c7d27ec655b19f83e498d542cfc15a41c828bd3a2860d50393bf0a00e1c0d88c7e8da4b170d6cf3b799dfad539dbecab25e89457aaa9ddcd35b587e9da09a98a2512bdea82e87300da42135e55ca75f8cdc228246fbf1ebc191bad0762582b21c82514931d85a050469569c7aa9391f584e602201f473b94048995ac2ba992f0cd8dae625e4199756983403e6a4add649900"/201], &(0x7f0000000080)=0xa) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000040)) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000040)=0x1c) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:52 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x0, @multicast1, 0x4e20, 0x0, 'sed\x00', 0x20, 0x3, 0x5a}, {@remote, 0x4e23, 0x2, 0x2, 0x6, 0x3}}, 0x22) 07:57:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x3, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000400)) r3 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x3) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0x2080) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000001c0), &(0x7f00000002c0)=0x30) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x4020, 0xfffffffffffffd23) openat$vimc1(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video1\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000280)={r5, 0x3, &(0x7f0000000180)=[0x10001, 0x0, 0xdc], &(0x7f00000001c0), 0x2, 0x4, 0x7, &(0x7f0000000200)=[0x1, 0x20, 0x51, 0xffff], &(0x7f0000000240)=[0x8]}) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x81, 0x101102) write$P9_RAUTH(r6, &(0x7f0000000040)={0x14, 0x67, 0x1, {0xa, 0x4, 0x4}}, 0x14) bind$nfc_llcp(r6, &(0x7f0000000340)={0x27, 0x0, 0x1, 0x7, 0xffff, 0xffffffffffff8000, "411000971e47eb05bccea4b653d83a1a1d53bff24cdcdefbf0649d5cd55c8dffb72fba97bd92224194fece2f154e9ecb797cf9ab98f1b507307b8863e0cede", 0x13}, 0x60) 07:57:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9c, 0x400) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 07:57:52 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000000)={0x0, 0x3, 0x9, "87235b675102aa04a965351d142d6847df4702c1707b37b64b80fcb9fcd9547711f3b6e77b2585c7c9c74a0bb5f7eaed5744254e8c95ac8fab8a681f", 0x1, "f4a6e2b85f5e6314232c7fb16dafc7c60e6f3447c296cf00fb8b280bdb5b32b8127130d24ccf53447e0652baec83cec6776fc0a16b188b03bcb5e9f3", 0x20}) 07:57:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1040002040}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x44, r3, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004092}, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(ghash,cbc(cast5))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) 07:57:52 executing program 2 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:57:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:53 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x181400, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x21, 0x80) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0x5, 0x101, 0x0, 0x0, 0x49249249249237c}) 07:57:53 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0x10001, 0xd, 0x4, 0x4000000, {0x77359400}, {0x6, 0xc, 0x3, 0x1, 0x1, 0x9, "b6b54b64"}, 0x6, 0x2, @userptr=0x7fffffff, 0x4}) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x80, &(0x7f0000ffb000/0x2000)=nil, 0x7}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sched_yield() sendmsg$alg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffd95, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40041}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x2}], 0x1, 0x0, 0x0) [ 500.603949][T12835] Unknown ioctl -1067952623 07:57:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000000)=""/151, 0x97}, {&(0x7f0000000100)=""/94, 0x5e}, {&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/120, 0x78}, {&(0x7f0000001380)=""/129, 0x81}, {&(0x7f0000001440)=""/237, 0xed}], 0x7, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) getpeername$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000015c0)=0x10) [ 500.641081][T12835] Unknown ioctl -1071094763 07:57:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/188, 0xbc}], 0x1}}], 0x1, 0x2, 0x0) flock(r1, 0x5) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) 07:57:53 executing program 3: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)=0x6e, 0x80000) r1 = signalfd(r0, &(0x7f0000000140)={0x3}, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) getgroups(0x1, &(0x7f00000004c0)=[0xee00]) fchown(r1, r3, r4) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r5 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') write$P9_RREADLINK(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="3200000017020007002e2f66696c65309e934bdae904ffda0d04f14e4a39eaf751af6dcdacccd854310f2eb4b4aa579859195dd52084b4b02c8356485d49799d2104b08827c72267c2e36c474cd60504b062c9efb1c2ba2d39b56e7113eeeab9f9cadbfe6d72baf022fe4e4b6951000000000000000000000037ff2b7b6977f956"], 0x10) recvmmsg(r5, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x133) 07:57:53 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x3}], 0x1, 0x0, 0x0) 07:57:53 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1c00000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="05ffe400070004005c42cb000900"], &(0x7f0000000080)=0xe) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x6) 07:57:53 executing program 1: r0 = semget$private(0x0, 0x1, 0x400) semctl$GETVAL(r0, 0x0, 0xc, &(0x7f0000000000)=""/142) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = getpgrp(0xffffffffffffffff) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000000c0)='net/rfcomm\x00') r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') setpriority(0x1, r2, 0x883) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1080011}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r6 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r6, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ptrace$setsig(0x4203, r3, 0x81, &(0x7f0000000300)={0x35, 0x0, 0x8}) recvmmsg(r6, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:53 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x203, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000300)='./file0\x00', 0x0, r1) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) readlinkat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/36, 0x24) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000200)={r3, 0x2, 0x20, 0x7ff}, &(0x7f0000000240)=0x18) socket$bt_bnep(0x1f, 0x3, 0x4) 07:57:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xb8}], 0x1, 0x0, 0x0) 07:57:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800000000004000, 0x0) write$UHID_CREATE2(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000001f000000000000000000000000000000000000000000000000001d0000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000660000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000ff7f0000010000000000001735fff8d584a1188ddf95165795214477a3af081130ef0deec3c7d652a080b586d5080e5f7b56aedbdbbc49a0009684ff1c3d251f8bede064760882b43da749a3cce5253f0800ceedcb5431f807fa6c076da4731c9dd0dc34a172f0def25f7c56b559cc9536d80cd93fdc4eb35dfb51f321fafc3e88a662f79d1431c7dae61a44f1897ed4b4257e15f0eb3b10f4f3966f9688122ae9b66a92b827410000154bc8e9a09a2b86b5bb582c3b1ed21a30929742ed60ec2c4d912c445d3d55c32659119c37dc2826873e1cb024f6864fd021161226f1185b26c73e1ad757684f7ee2baefc218b30b9ab87e5c209dab612d92c03b17dd56ce05232679620eba1754f867f570a593aa0d7fcf1dc33c578e7af45d8f1053833b48a212a59c"], 0x1b4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000380)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, r2, 0x204, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="3000000000000000f4a5b0e8339e5a0aa3deda61bcb4513c7ad0636492945466fc58feffffffffffffff4bb500a89a3759f64f216de21aa66ac558952a553a82530064ea447c1595c9d7851638048bb42442dbb15a49451e68af0ed8aebe5dcf0d"], 0x30}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000140)={0xb, 0x0, 0x6}) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x2711, @hyper}, 0x10) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:54 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x300}], 0x1, 0x0, 0x0) 07:57:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x80002, 0xe8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000001c0)={0x23f0, 0xf3, 0x2, 'queue1\x00', 0x9}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="00f0feffff0f00000180000000000000000000000000000000000000000000005074d68c6d7c06c7b4b0c968063a8e7569400000000000ecc690fe210d1fadb6da809f9b4d71b83e3251dd727d7f0e40a4345a0df01cb85f38075dd5fea51f00000089e9e3327aa73ff7a5d1c902dd226a5d3917f9e2d0355643f02591de00c0d2f0a9c87480910000000000000000000000000000702bc490741f86f46996af57444eb5881cdc3467526c5de69c2cd15d4bdd48ee8a13af5ac9732045c500b3ba03fce36dfcd3f6fd"]) 07:57:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40000) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000000c0)={0x1, 0x3}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x90, 0x1) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000040)=0x2, 0x4) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x4000}], 0x1, 0x0, 0x0) 07:57:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="00f0ffffff0f0000010000a8b1f59fea94797840b43c8701a31900090000007a8a7bd731dcbd11000023000000bf2abf33332bce3327734369ec9bd4c81b6d587c20a8f5e6fb2baae6ed7b28be4a32ca4314a2579fb057212c934a6a63b1cab8579ca1dfb29ce5ac24bcbc245b8805fd05d6c0a375cbad89821f2fab49d4f694e62c92d94cd608b36057390a78d9e7cf495c4cda65622c93ef081fdd9c56be6d9edf5e01b88b66c0cc0252f24ce942277ba480e5a7777bc5c99c613998a0d7963fd6f48397af3c7db3"]) 07:57:54 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="e3e81f02129b41416d8750a843cfe06b6569d21b22f1a6a391b4fd52d2354961eb73a745ebde1fe4ad3053944e04e7b9ab4765f369b77e79c13a41a50217712fedd2b8e1ed1d0ebfc55c4e55", 0x4c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x11) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0xef) r3 = accept(r2, &(0x7f0000000200)=@generic, &(0x7f0000000280)=0x80) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r4 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x10000, 0x190) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$SIOCGETLINKNAME(r5, 0x89e0, &(0x7f0000000140)) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000001c0)={0x7, 0x5af0, 0x6, 0x0, 0x80000001, 0x0, 0x4, 0x1, 0x7ff, 0x100000000, 0x800, 0x3ff, 0x0, 0x7, 0x7, 0x40, 0x10000, 0x0, 0x4}) 07:57:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xb800}], 0x1, 0x0, 0x0) 07:57:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) r2 = getgid() fchown(r0, r1, r2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffef0f0000018000000400000000000000000023000000000000000000"]) clock_adjtime(0x1, &(0x7f0000000200)={0x1, 0x81, 0x7, 0x6, 0xffffffff, 0x1, 0x3f, 0x7ff, 0xf77, 0x8, 0x1, 0x80000000, 0x100000001, 0x1, 0x100000001, 0x9, 0x2, 0x10000, 0xfe, 0x32f9, 0x6, 0x80000001, 0x7, 0xff2e, 0x3, 0x3ff}) 07:57:54 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x400000000000) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80084}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRESHEX=r2, @ANYBLOB="010427bd70087fee4c2b357ee900080002000000b8239b4294527c82cd5a19"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)=@random={'security.', 'SEG6\x00'}, &(0x7f00000003c0)='ppp1user\x00', 0x9, 0x1) 07:57:55 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x30000}], 0x1, 0x0, 0x0) 07:57:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000480)={0x0, 0x2da, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x0, 0x1}, 0x1c}}, 0xfffffffffffffffc) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80200, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') r4 = syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0xce, 0x84100) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x440800}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x84, r3, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r4}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80000001}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x4040001}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="ba7411421d671963a48d9dab442a765ff459c4c2f39faa3c9c6f1e39029ed9bafef1fa0a47a88ed150cee260d9ce3cdd8568aaddbbe8ebf4fb424eed55d630efd72ae8f46b9dc13638a06237750a608503661b678dd3363f29d17e4df092c7fd3a8ca4756f94da7d324c3cd92e3fc498a3688815a2fd7dcee49121c9ff59c0db6b94217aee312f9fc8a10ef5a4763aabaf0c72c9a959b94d29750fa421214e02a7451c07e6d63b719158fb2943ad323258f1444f1e5b8c598ba028813bbf605e1712ff6ff380b082c3e81a07fe45be66cb1968fa2411d2cec0fe374b46f0b3372534c9916f61a05c55ea29cdca5ee4f664872514fd65540f4b6e5c1f49d5845c356bad63c566c24015b79c65023180ddf682786c80df8d75a42873fbc2f2f44423507e669860c438a976096044cd940e65de85e91024baf0c6388e1082db7f0968c4ba91492e4eb40017cd252e8689fc352f9c7e9ba12beeb3a70be3b9d0b2ecddcad0900a9327a22f5202f708a235fd55f45557f936f088d2baebf762e43ebf7874ea68c8b9f5c8d34f431dbcd254b87685154f207bcf603c10219c5fd5473cf1a11b01ec9318a55f41aff588184739c32c4fd6da2676bbcf7eae78bcbff401bc123cb36c18b6c9fc001459c0d7ce4650262dd971d27f4a0247067bd29c17ce223bfd98dbbd30e303654a9de6d15fa3a86e22a96428c1aa73a772be7785e0d7b686a6e67f5e45d15e0d86b88f4c217571ddb2078140ae999e04ea271251d64414061fb43be8050438935c8cf5bf18270280d653c0b8851b19f7ed7425f3bc1fb7195356dbdb89c9abb162f8361429a6e2d6ffd33cc2cde8967228029b9a7c44704671b9e5b504d07c51534f0e302fa646a28cc32fb4d0c3124d8c0495e25c33ef50fe9d0088084057b51bc4c59fc2c3272252a650b3adf00b213d99f4ecc12be35e7a81ede1b208009f4897a7c05b4ba30d09a8d423d34177de8f9f87501682c568a1bf6ab4a3a8070b57ddb7815898694528dfb1eae79a5a1eca13b281b339da71a11b0ba07248eb103dabf10d48c6db9405a6f2950b595913096cbf35d407e9c4760880a09a52026ed0b66baab738c9fad5c5420cb7d072878fc177f0ab3888704ca68831c37281b80ce86dd0b8a25d7d0143c60db6c5036fdfa37da8f63e5ccb1246b56114da0542c5b8d20aea20a6dd2d51bb2febd53707d0accdba715e118f3ac439ff03e39f33d72a341c7773c7e8b2f299732aa9f8ef4c1642027553f7c4092523f4ed793a1badd0d12af1c21275390fc1bb78ce79e5c59da045a82a88e2b39bd59f67ae07d9476b1f7de9f65a7fdd162218d065b00b8302675aad3915739d143cfcc6029479d59841bc4e6c761ac09bf55b3d7662f202bac1f640d00c54adf099a6b3baea9e3b87e5063a29bff0c1c297db00af590dad9d80394a3968f695f23a0a3a6a9b08099285076e9833389b502ff65b6ad0b0e78d7560ab734b06ad42def9d5b4d186e150994536fb5fb54abe79087cc5b98833df84849fdadd5a15dc00f6f0ba2a4d0dc674dd4b9fad7f75776e760b888178003c3db3e2a1a64dc4acaf00014ae2bdbf60f8ef30e23bc397bb05e898a1e7895aea7c0a608c7ae69dedda9e77633c557b41d55a2978d4ce18c9dda90f0671288fd3c48d49a9db66cb15eb4b84247fdbddfcb2c9ec8b0187b5f05ea287fd2030dce3069cc2593ccc39c3cb27e94cb6035b91329700f3dba237ccc80cc0d850217e6b7a9ef03dbd75b7c023fe9b942b7eb7c85983b968f25efbfda44697bedc27372f73a7311d873a71aea449e3004fa1a4555ddc84ed47719f6a150e4cb2492ba790e29b893400d5f70605d39e6376288d9e0ecef815b873e55f2dc59430d29b9a93d14c7f106d00d0565eeb5068d6f73325eccd4b7b6fe20108710c5049ce34baccfb49e434642488f61709c80ef7522e6ce7f5ebab9b7c1206b966d174d1727f3750a428b852886a1fedc95a195af472c7bb34acbd097b2a64fb91637ad21cf8f8e9cc998643e614cd2bf283154936e062deafaef08608b78745d620bc2b5088abb62328fd1a3c4cefef61862630f85a10ff7d108942efbed236f6d0e13b02199d94a7ebf8b8e4c75bc0b686faf3fef250956c6003b3f785797c9ccc1479f11b580e02ae414aa6fad19c0bf49f97239357ad5d9d8c9d645093c774ae930bd2a40baf0b159a60e485dc67db11e02b1ec3e84d3108004ec170ed614249015679e34f944e9e056a66647e05e0807ece0d22809a0c763f012ec367315e9ba9758494b45f3606b37105d43b12ac77ec52d7c63fd46ae1186dff75b7ed737499bededfa4cd926937b149bef1008e1aa2fab2c2197d86a0876d9d46e3276a8e14a28ed3f74c5b0f8a181f582b5aeb4c8dc8e0e26dd6356b4605b95d8343367a058d49731d15c050543d4ab566884721037aebb1819be70564c1b1f852d787026db08be3d61b600a8a70e0dd9970ae590d36b743eef8be1fbfc6d1aea404d0bcf72282d1b6dedf153b6a7e0c71c501c04cf057eece22fa8db0c9ff965874240915cf730699f36fb7da58d7281cbbb0c165966764d6a3affff13c98b04ee927b46101aa893e863d6fc576068294ebfdd6757f0e413dd34eb79163656308c59d9e5da6063d9627cb2afe7972dc67b0155fea4b19d9f290e4244e25116fea4a5f5fc017f967a9da5d9ee2ee64067a8a8bd7eac24c7ced73c6a822ab97a8ecb794beec3e95469466fd970d883df3a5cf78d2650bd5b3c0c497d67f6d1a27ca37ab351ac183adddb6bb6acf6b8db0758c0c447157bcb65a13016becd050516ecd59bbf275fa220125c39f58ec2bd1e51b31a15c6222539e0bc81e13069a44d82bd4292c292eb02dbb914463a6da9ed99788e5052d02e4af668ccf9c4421065248e6bdeb9d7803a5f14af8a8ed16ef85b9fa4b3a0d2a84061703f9f9c917a95e138b91fd67b004f97e8ea7b7d503f371046f21a75ff4fa1faae74122bcfc80fe30b71250679b66503f829001385d370014ba3c3680395debf4c458c763ca06a3dc5fa96bbdef2589fda67e8532aaeed6c65b3f8bdedae2b4dae25eeda35f5268bdd48d2d63a59c113c12cb12880f15aecc37138dfa6016e0a0dc3c983b4ba525036a2148eaa08a13f7cb4b488442553a77ae9787f188c2814897d3d7cfe0449de901a6034f366183ed7c381d358f4151fde8fbb6a53713a088c54a0cf6330ff950aa4643ea35199ffa1b5237335fc59fc37762f20c0b9b866326d8491d045de210118d734fa120fa6fb6e10ce6f9888e9a69e937d74efa9e8cf7afb95ae569c60dbb68fbc5f0009f66218e69d9a6b11a0d6c99c8b5ab9ffcb79e4e6e8984a8f841c167432a31aad9fec022aba1c96d45fff10402a85569894bcd335901ceb5ab241dcf0ba987d3515bab9fb09e8be6c1539ec53fd221c5c839fc97ba1de2f9d7fe7abc4135681969f249a8d4f426f33d6594490d3ca5e26f5ff3a32e78eb18da4b6b94b99438f73daccadab60b17b2563a63546d62c4921bf71b19705af42da099d66eae8159319ddee779c23cd65bcf29c0eb6850cc23d449959ee3b4de7cf8e6bcd5394ceccb799d1fd2d34aead8de71221051199ef6dd37d09ac0515a29fc4af9922475b9e95241cdf644d6ce79eaef5583e42f06fb33fcdba2b25d386856e8565c5e31fa501f612b509be52bcb84f8ae18ca1e188f0c67853594031e7edcef3799c2f765d95a8efc02f448285e3f8027c795460ee01165cd5c67cda71cb62bbddca17babfa5bd443752070f0546fa56f57dd352d8deb5554a468c848eaf94de59b2df0d61a4457e0b46dbe1154fd471f211c353087c350336b64d0752424f577e4b0a9a3f622f2eff5db8cafec2c9587a115f3f124eb0204923d8111bb8fb6e3ce125c874d8fc175a04b1b48cbf3fbd8614d89640e0c803dd51d218e3e18a3b7ee4f0eecde60e615a826f3c98d4830f949cf9a62cc6c55dab80e1eef0fdc48936bfaf1a3b2eda882191e02a694a0abe18184ac383b32e915a5c6241b6b62eb9559d31a918ae8af34f8d8419e8a663ee40c0296459ad8e4ab3846cff4241b2f3ef2030037b88927babc68f3c9bd4254512aa6ce93ec3c8067451ff8a50a6f510e9a1736660950c846da43605636b62015f5b3ef7549865383fccf05d9b7612b0d6b1dce36cdf40de3be7e0e7963f766e6ae50d88fd3d2e2a54f3df1670995bfae624c4ee009858373df0d2d3eba2415f97a8c06122c41ef2549f6aa415a104a65934b9dc7437f96a1b531c868d30f2d7b23a0332250868b5830be2e141fc96eb81a96b5a2cd01552811c94315cca3acecc42af4f15c3d538a4321120ba4d8b3c5b3dd08929f79363090c425d1464a3f9d00cdbe84bea909c1f374132f472d77199002ddded5191963d8e29d7fea9523d6fda99f3e65d47e4d18acb7bd967022131e59ee62be38f8b77f8231a7d2963e3f900ba2f615ef5ac17a0dc31dc5073ce6759f60b8e52d0a77ab1cee7290fac4d4f2ca1d3299052b6bf8377bc9ac1e0c7c7426ad4095aab2a31fe1fbd05eaf1043d789365e4334794378c19c8d56522f00a9a5b6b2e962cee499976550a78abc8644a85a2ef16e53e0daacb449f5e6e2f29bf638006e00846546bae7ffb10080a243c9792ab298d43b0a7e79b26120f5c8a814774e66a76740c6efcf821266e890d54fc73c661e35c18ce23e683ac11b909d6dcdea134f2d4966cfd0fe383a6055daa7cf2d7da27dc86d11d6e160fc2e0eaf5c540b13801faa0d0ebcde234206d8661a66ecea5656ee81fa71db978e4c11260c967e9f4ce927740c754406c76a6ce3b8bbbbce1412b1c59e7240841b29a93a82af54e4be7274e07db457be71e9bd6a21d89beacf43b03ecf385ad57b8f1da80d5ba71b493a23433ad6052feb03197f0a6b48187a56eaeaeed520ec8dee0247d8c0efe86aef35ac6c8b5acfaaa359a77739a2ef6ac91404923d70bff998579d7b0f647fb9b52d233b02eb0015fcd7a68b6b8187c28380354b939e61dc0eebc01100461fc07c92b918f8ddaac807a31981a34b21494cb67db856d918d1154bdc2330d0c1ea9114ceba21f98d50bb951da480f92c0374773f10112b0f829ff4a0776e13ad144433f93679a9f18d7752afe37ea5929fd850683b23dca891fa206f1bbd34ee407e68b8c4103d7f447a113b1afdf2bbf3d62c4886181a1dba8c1d4aec4a5b350444a275eb6fb98bc4b92976f9066dfeed8065e8f4acfb85358a7ac048ffadb503321b93db4f22eff8528dc7484cc17b9a9653d0fbf86c7652fe21726e6c2a801131d56d1b96a8b62acd7f0ee9ced6de432c69436f8950620c9119f9072f1ed0f9e17530f305cd6a83ce8b21bbada869aa24ae649f05af0a0d9270fd54cb012c3966a262311cf24e7120e674f670437b9803f45456a64e2fd9c9b049cf338daeef2ee64de308fe63d5585af43751223f15ca6cc0830416e06f43568b55a5effab069ba312710c22c8f25e2bd1aa221ab814f4eb173e8dbcae65620672732e54df9df9f3f37bd35439021cf703658235223010b4bf72d4afe9ad4187e08051141e93c3cfc198550547d1067c41a19c8fdb2cdb2b44bcdd0b5bad26885cb051aed1d978d74a5d2d03d8b0ef1942735ea030cf2b41504b6e6b03b0978995dc6eb0d64c10b5f463ffe34e0bee2da2e293b3e92c2f774e05c1ac3dfd30802bd3eb39451b70de6f7c748c24bc9fc3ad1a31aee13aa1f44684dda49faa176997c62c9f1a4ce68e83a", 0x1000}, {&(0x7f0000003440)="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", 0x1000}, {&(0x7f0000000100)="6c4825daeaa6ce488462ef30ae64b7cfb27db37dae1db3be67675a6dd3daebaace20f7e9330d280ae58ab5a6e8fc14050f6d898d81a87a78b098822678880f8fd2c8fd1fac2b7ac2e6d3263e025b825880a4a9ad09ff9f45b1745874ca0b7696c9c63c6474a1e7e9ef1c34feb043b9dc08e0662363ed75cf9b3da664b7052c8554bced4983478b63d9860c5ecf7446f7c0d393cb7fe8e7f80f5a040dce53b6be10e572eb2b0afae4a04d84cdb5aa2938fb73373f7d44d4c6f02767f94fa7fc2e21bd32b7331b969ad6cd3b933df87e", 0xcf}, {&(0x7f0000000280)="f1d5a683ef59a81d7462f2177350a5470fd0bf251693a996fc682f67b5af51d68568300589109d977b8a06897829cb968bbec0dd23163aa1e18ddb54ddf5892e5186c5e8696f63f641609bc67b609d8823b60b17bb7b8cb7adb6ff596729db9336a9ae46828e78c9b329950565517411d40b9349fcd36bedc75a0d9575c35cecfad22a6778866d8d99aafd5b118e33c4ee1acd45af8ecf11e563875fa1c07fbb461363dc51939f8856fadf488d06dcb127a4b8fb4dfe90fe88ecb52bc60e591809d4", 0xc2}], 0x5, 0x0, 0x0, 0x4}, 0x4) 07:57:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x10000) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000280)=0x4) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x100, 0x1, 0x1f, 0x7e, 0x3, 0x8}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x5, &(0x7f0000000180)=""/233) 07:57:55 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='mumt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f000001800000000000000000000000000000000000000000e922"]) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'veth1\x00', @broadcast}) socket$bt_cmtp(0x1f, 0x3, 0x5) 07:57:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x2000000}], 0x1, 0x0, 0x0) 07:57:55 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000000)={r0, 0xc6, 0x7, "037c902a000565d7da8d35d80710881ed2693f7b65b857afefcca97a0a88e0c4830b2da7bdceb26f4a732bdbf502747bc4075f8276b55c335371ab3f4d1951ff1c3c32d9440902c07abca35a453742d8492bc49e"}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$key(0xf, 0x3, 0x2) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r3, 0x58c, 0x10}, 0xc) recvmmsg(r1, &(0x7f0000000540)=[{{&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f00000001c0)}, {&(0x7f0000000380)=""/36, 0x24}, {&(0x7f00000003c0)=""/196, 0xc4}], 0x5}, 0x9}], 0x1, 0x40000000, &(0x7f0000000580)={0x0, 0x989680}) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:55 executing program 2: prctl$PR_GET_SECUREBITS(0x1b) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x40, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000580)={0x6, 0xfffffffffffff800, 0xcbea}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl(r0, 0x7, &(0x7f00000001c0)="b836d44c4966797fad9a462416991cc7f7964ec29ab437471d5e9df14147af74175d9471b37baf98c02600935b72c8da8bf9ac8c72d0aa7d44813115698747de33898fd597cf2acb8e5c41abf8b198cde0c9bd89d50f3d5570e2013f56") setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000340)="e6f1d016963605268303abed3bda6abfac2224d949582def4e87858889ba365c814112ea64e1d02af31020ee77440a6f47b0127cb4c821de9eea7f50ec4e71c34ba7dd9bbac3282efd6640be472d7ef2a4995df3abfdd0138db087e72de6d99365487b71b4219670c9007be791", 0x6d, 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='\x00', 0xfffffffffffffff8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000500)=@keyring={'key_or_keyring:', r3}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='children\x00') openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0xfffffffffffffffd) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e21, 0x81, @mcast2, 0x401}, @in6={0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x7}], 0x48) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x40000000}], 0x1, 0x0, 0x0) 07:57:56 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x6440, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000140)=0x13, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={0x0, 0xfffffffffffffffb}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r3, 0xfffffffffffffff9, 0xffff}, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f000001800000000000000000000000000000000000f50000ed04"]) recvfrom$inet(r1, &(0x7f0000000000)=""/173, 0xad, 0x60, 0x0, 0x0) 07:57:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:56 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x8dffffff}], 0x1, 0x0, 0x0) 07:57:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffec1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00f0ffffff0f004001802100000000000000000000000000000000000000001209c9b3196ae49aae4d038f559bb80e648044a8dee4dcaeb3758d9b1d68c03fdb5a5a723d7256bb75ba5e91fbffffff204191ef2e6018a4a2056d5d40afc13bc23adf0f71b701a705e3ddf83f1648f1e11017dd5eb2e275583d1b27b642d4863538b1040f2bc688d543c5"]) 07:57:56 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x2802, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f00000001c0)='/dev/sequencer\x00', 0xf) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) write$binfmt_elf32(r1, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8001, 0x5, 0x0, 0x8, 0x3, 0x0, 0x6, 0xf2, 0x38, 0x1aa, 0x1, 0x3, 0x20, 0x1, 0x7, 0xce0, 0x5}, [{0x6, 0x0, 0xfffffffffffffffc, 0x4175, 0x4, 0x5, 0xfff, 0x3}, {0x7, 0x5, 0x10001, 0x1, 0x200, 0x6, 0xc3, 0x9}], "a57032696df21745d2dbbfa100a56f3d6d8ecdb26923554e24f5333e2830eab1f0bffb0d45d4727ad89d86a74a398a5c30e80443745ef386309280736fec6b614ed3f6f170170bf0a629e9354812078ed3d32e1f1e3eee4ea7a5abfde79bf6f1b9fedea195bbec6705699c86d284c05287885cc0fe75da1dd3f5b84159aac57fefb672107e9efedc202e265d3a7973758ad8bf74523d0dd23f09adf66a9ffd3e966d6e4c8636105cf3fdce72cd", [[], [], [], [], [], [], []]}, 0x825) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000200)={0x18, 0xd, 0x1, {{0x2, 0x3, 0x1}, 0x7f}}, 0x18) 07:57:56 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xb8000000}], 0x1, 0x0, 0x0) 07:57:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0xa) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x9, 0x400000) clock_gettime(0x0, &(0x7f0000000f80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000f00)=[{{&(0x7f0000000680)=@nfc, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/2, 0x2}, {&(0x7f0000000740)=""/107, 0x6b}], 0x2, &(0x7f0000000840)=""/5, 0x5}, 0x8}, {{&(0x7f0000000880)=@generic, 0x80, &(0x7f0000000e00)=[{&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000900)=""/71, 0x47}, {&(0x7f00000009c0)=""/51, 0x33}, {&(0x7f0000000a00)=""/117, 0x75}, {&(0x7f0000000a80)=""/184, 0xb8}, {&(0x7f0000000b40)=""/22, 0x16}, {&(0x7f0000000b80)=""/228, 0xe4}, {&(0x7f0000000c80)=""/102, 0x66}, {&(0x7f0000000d00)=""/225, 0xe1}], 0x9, &(0x7f0000000ec0)=""/19, 0x13}, 0x8000}], 0x2, 0x1, &(0x7f0000000fc0)={r3, r4+30000000}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000180)={{0xa, 0xddcf9cc1b5e2503e, 0x7, 0x9, '\x00', 0xfffffffffffff45d}, 0x1, [0x81, 0x4, 0x7, 0x8, 0x3, 0x101, 0x3, 0x4, 0x0, 0x998c, 0x3f51, 0x7, 0x4, 0x4, 0xffffffff, 0x1, 0x6, 0x3, 0x6, 0x8, 0x10000, 0xb0, 0x8, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x8001, 0x8, 0x400, 0x6, 0x80000000, 0x0, 0x6, 0x1398563b, 0x1, 0x3, 0x40, 0x0, 0x1, 0x3, 0x101, 0x1000, 0xf5c6, 0x8, 0x401, 0x0, 0x3, 0xffffffff, 0x5fb7, 0x7ff, 0xcd27, 0x1000, 0x7, 0x4, 0x80000000, 0x4, 0x4, 0x20, 0x1, 0x100000001, 0x7fffffff, 0x5a, 0x4, 0x2, 0x6, 0xa9f, 0x82b, 0x4, 0x59, 0x3, 0xffffffffffffb03e, 0x0, 0x5, 0x5, 0x8c, 0x8, 0x8000, 0x8d58, 0x1, 0x3, 0x100, 0x2, 0x7, 0xc6, 0x6, 0x0, 0x1, 0x6, 0x6, 0x2, 0x178200000, 0x3ff, 0x8, 0xfffffffffffffffe, 0xed75, 0x9, 0x7fffffff, 0x3ff, 0xfffffffffffffff8, 0x329, 0x0, 0x8, 0x9, 0x100000001, 0x2, 0x8000, 0xfffffffffffffff9, 0x4, 0x1, 0x29b0, 0x6, 0x7ff, 0x2, 0x4, 0xa42, 0x9, 0x4, 0x6, 0x5000000000, 0x401, 0x4, 0x9, 0x9, 0x6, 0x1, 0x64ddb5dc, 0x80000001], {0x77359400}}) 07:57:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:57 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x6, 0x7bc4, 0x4, 0xfffffffffffffffb, 0x2, [{0xe0, 0xff, 0x4, 0x0, 0x0, 0x108b}, {0x100000001, 0x3, 0x2, 0x0, 0x0, 0x4}]}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x100) r2 = socket(0x0, 0x80000, 0x40000000000) ioctl$FICLONE(r1, 0x40049409, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000040)=ANY=[]) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x40) 07:57:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xf0ffffff}], 0x1, 0x0, 0x0) 07:57:57 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x7, 0x1, 0x3f, 0x1, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r2, 0xf76}, &(0x7f00000002c0)=0x8) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000180)=""/232) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:57 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x6c0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x5, 0x80400) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.stat\x00', 0x26e1, 0x0) geteuid() ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000280)={r1, r0, 0x5, 0x54, &(0x7f0000000140)="e0160d62beadffcfb73fa26f1ba1c4db00edc58a33647d4820f950622603c702efafa23a910dd521a4834061c3a9d1f72f3c47e49a13520e505bab6fdb4e0e2985b358ee105c088ccde26813f32abc5a0e8a15c9", 0xffff, 0x81, 0x1, 0x4, 0xab, 0x1, 0x7, 'syz0\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000040)={0x4, 0x10000, 0x0, 0x1ff, 0x9}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0xfffffffffffffd1c}, 0x1c}}, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="4fe3d862d2785acb034f", 0xa, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000340)="0f0d414b77f1de20dee8214d2bd2ae664960057315bf071ce97ab1eb421ed4b7cc3381c854d76a0b4000719537df658af3270592d06751c8a8768358bd1615eddd18", 0x42, 0xfffffffffffffffa) keyctl$unlink(0x9, r0, r1) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xffffff8d}], 0x1, 0x0, 0x0) 07:57:57 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:57 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x341100, 0x0) connect$bt_sco(r2, &(0x7f0000000040)={0x1f, {0x5, 0x8000, 0x8, 0x7f, 0x0, 0x8}}, 0x8) 07:57:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xfffffff0}], 0x1, 0x0, 0x0) 07:57:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_GET_SECUREBITS(0x1b) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f00000002c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x6) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="070000000c0000029dd2000000000009ba61f52de7d20cd90be1c367354756a92ff14475941d1a8ac20435d8b216fca292b2c2120800000000000000dedd060a8cbb891859cad384b5d93d75cae70ae2f37c97e686f9084500134ec7a615338cf862d095985bb7811ce733deea3088057694b58535b9902a27043ff414ceddaf0de91e1bc282cbe1686315738b4304887fa2f8f20a5faf5b5bff7941045e84", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="100000e001000000020000e006020000f62294b882035833"], 0x48}, 0x1, 0x0, 0x0, 0x44800}, 0x4000) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000280)) 07:57:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) mkdirat(r0, &(0x7f0000000140)='./file0/file1\x00', 0x114) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x3, 0x0, 0x80000, 0x81}, 0x10) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:58 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:57:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x3000000000000}], 0x1, 0x0, 0x0) 07:57:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000040)=""/39) 07:57:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0xe) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:57:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cp\v\xa0v\xf7 \x02\xc9pu\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)=ANY=[]) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x4) 07:57:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x1e) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) 07:57:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x200000000000000}], 0x1, 0x0, 0x0) 07:57:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) 07:57:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000380)="dac7d70bfff335dfa0ce2e3137cea42f22ebc8fc89545d77308c61c9a94dfd8bd1010ab1d060629e126325bef2cfeb40dfdc95a5afeedc5964c85d6ef6b212197a4997061a75940692718df450b6e51a298d8c016398ad31cb", 0x59) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getitimer(0x0, &(0x7f0000000100)) r1 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x1f, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f00000001c0)=""/195, 0xc3) 07:57:59 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x4000000000000000}], 0x1, 0x0, 0x0) 07:57:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000000)={0x0, {0x3, 0x1}}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f06a0000000000ad975bfc291a5c9b69000000000000007400000000000000"]) 07:57:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000001, 0x129202) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x100000001, 0x0, 0x4, 0x4, 0x100, 0x4, 0x3, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000180)={r3, 0x3d, "e4821398f1f9932ac532869a1c14e7c602262c298591e9b53ac67923138cad09b18c29d5e98b8dccb99017a60d8dd75d8e8d2b15a496a0966c445d2cab"}, &(0x7f00000000c0)=0x45) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0xfffffffffffffbff) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:57:59 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000940)=ANY=[@ANYBLOB="00f0fffd000192d2741829c9cb321dd491eaa1caff0f00000180d7cec8de98440000400002000000010086001a965327621969636e0ce881d50d1d4f7fd966230c29847898446804ad95e1cb24"]) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 07:57:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x8dffffff00000000}], 0x1, 0x0, 0x0) 07:57:59 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:57:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:57:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xb800000000000000}], 0x1, 0x0, 0x0) 07:57:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x200, 0x22000) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001200)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000001300)=0xe8) r8 = accept$packet(0xffffffffffffff9c, &(0x7f0000002480)={0x11, 0x0, 0x0}, &(0x7f00000024c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002500)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000002600)=0xe8) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002640)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002940)=[{&(0x7f00000026c0)=""/81, 0x51}, {&(0x7f0000002740)=""/195, 0xc3}, {&(0x7f0000002840)=""/237, 0xed}], 0x3, &(0x7f0000002980)=""/23, 0x17}, 0x2}, {{&(0x7f00000029c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)=""/172, 0xac}, {&(0x7f0000002b00)=""/31, 0x1f}], 0x2, &(0x7f0000002b80)=""/113, 0x71}, 0x5}, {{0x0, 0x0, &(0x7f0000004e40)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/53, 0x35}, {&(0x7f0000003c40)=""/201, 0xc9}, {&(0x7f0000003d40)=""/244, 0xf4}, {&(0x7f0000003e40)=""/4096, 0x1000}], 0x5, &(0x7f0000004ec0)=""/83, 0x53}, 0x9}, {{&(0x7f0000004f40)=@isdn, 0x80, &(0x7f0000006400)=[{&(0x7f0000004fc0)=""/203, 0xcb}, {&(0x7f00000050c0)=""/214, 0xd6}, {&(0x7f00000051c0)=""/137, 0x89}, {&(0x7f0000005280)=""/111, 0x6f}, {&(0x7f0000005300)=""/4096, 0x1000}, {&(0x7f0000006300)=""/214, 0xd6}], 0x6}, 0x1ff}, {{&(0x7f0000006480)=@can, 0x80, &(0x7f00000069c0)=[{&(0x7f0000006500)=""/61, 0x3d}, {&(0x7f0000006540)=""/38, 0x26}, {&(0x7f0000006580)=""/212, 0xd4}, {&(0x7f0000006680)=""/45, 0x2d}, {&(0x7f00000066c0)=""/17, 0x11}, {&(0x7f0000006700)=""/196, 0xc4}, {&(0x7f0000006800)=""/64, 0x40}, {&(0x7f0000006840)=""/173, 0xad}, {&(0x7f0000006900)=""/181, 0xb5}], 0x9, &(0x7f0000006a80)=""/253, 0xfd}, 0x10000}], 0x5, 0x2, &(0x7f0000006cc0)={0x0, 0x1c9c380}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006d00)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000006e00)=0xe8) io_uring_enter(r2, 0x101, 0x5, 0x3, &(0x7f0000000480)={0x8}, 0x8) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000006f00)={@remote, 0x0}, &(0x7f0000006f40)=0x14) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000005c0)=0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) kcmp$KCMP_EPOLL_TFD(r15, r16, 0x7, r2, &(0x7f0000000680)={r2, r8, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007040)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000007140)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000071c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000007200)={@remote, 0x0}, &(0x7f0000007240)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000072c0)=0xfffffffffffffecd, 0x80800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000078c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007900)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000007a00)=0xe8) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000180)={0x0, r2}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000007fc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000007f80)={&(0x7f0000007a40)={0x518, r3, 0x400, 0x70bd2c, 0x80000000, {}, [{{0x8, 0x1, r4}, {0x1bc, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffc8fd}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r7}, {0xac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}]}}, {{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}]}}, {{0x8, 0x1, r11}, {0x100, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x21, 0x0, 0x400, 0x80000000}, {0x1, 0x3, 0x1f, 0x400}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r17}, {0x138, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3087}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}]}}]}, 0x518}}, 0x4000801) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000004c0)) 07:58:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0xfff, @mcast2, 0x40}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000004c0)={r2, 0x563f5633, 0x2, 0xff, 0x100000001, 0x401}, &(0x7f0000000500)=0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x80000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x94, &(0x7f0000000100)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e22, 0x4, @remote, 0x3}, @in6={0xa, 0x4e20, 0x6, @empty, 0xfffffffffffffff8}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e20, 0x0, @remote, 0x7a3a}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e21, 0x9, @remote, 0x8}}}, &(0x7f0000000340)=0x84) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memt\x00\x8a\x11>\xe2\xf5o\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\x93\xd0\x8b\xd6-b\xc2s\xccV\x0e\xff\x03\x00\x00\x00\x00\x00\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0xffffffff000, 0x8001, 0x0, 0x6, 0x381, [{0x1000, 0x0, 0x1000, 0x0, 0x0, 0x400}, {0x3, 0xfffffffffffffff8, 0x10001, 0x0, 0x0, 0x8}, {0x10000, 0x5, 0x3f, 0x0, 0x0, 0x500}, {0x80000000, 0x3, 0xeaa8, 0x0, 0x0, 0x2081}, {0xfffffffffffffffa, 0x6, 0x1ff, 0x0, 0x0, 0x201}, {0x81, 0x2, 0x5, 0x0, 0x0, 0xc08}, {0x0, 0xee, 0x8, 0x0, 0x0, 0x2200}, {0x2b, 0x3, 0x87, 0x0, 0x0, 0x205}, {0x2, 0x3ff, 0x5, 0x0, 0x0, 0x108}]}) write$UHID_INPUT2(r0, &(0x7f0000000440)={0xc, 0x1000, "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"}, 0x1006) 07:58:00 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0xf0ffffff00000000}], 0x1, 0x0, 0x0) 07:58:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x0, 0x401}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4000044}, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) finit_module(r2, &(0x7f0000000040)='skcipher\x00', 0x2) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0xffffffffffffff67}}], 0x1, 0x0, 0x0) 07:58:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0xa000, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000340)={0x1}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0xffff, 0x81) r2 = openat(r1, &(0x7f0000000480)='./file0/file0\x00', 0x44000, 0x121) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x32080, 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB='mode=00000000000000000077777,appraise_zype=imasig,obj_user=bpf\x00,\x00']) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000200)={0x7, 0x7, 0x5841}) mount$bpf(0x20000000, &(0x7f0000000300)='./file1\x00', 0x0, 0x5894, 0x0) 07:58:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x7, [0x8, 0x7fffffff, 0x5, 0x0, 0x7fffffff, 0x1, 0x80000000]}, 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd2c}}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f00000180000000000400"/32]) 07:58:00 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:00 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1000, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000004c0)=0x80000000, 0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r2, @in={{0x2, 0x4e22, @multicast2}}}, 0x84) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r1, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x10000, 0x6, 0x20, 0x1ff, 0x11, 0x7, 0x400, 0x7fff, 0xffff, 0x3, 0xfffffffffffffffc, 0x6}) sendmsg$alg(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="50000000000000001701000002000000370000003ab61424947eaacdf31e437a5ad1a906b7a51b881334f03228155b9dc4e791f278e8a77e29427ce0aa0b0c0612975fc16e6315f8000000000000aa0cbde0dd2ab8fa001a81b6f214cf96cccd1900de9a7532f91301170100000071ff538b3207f0b96827978dfb2bab8d29501c2dca58295dd9e9"], 0x50, 0x4040}, 0x45) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000400)={r2, @in={{0x2, 0x4e22, @rand_addr=0x3e}}, 0x8, 0x4}, 0x90) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000500)) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x14) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) 07:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x100004, 0x0) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000900)={@null=' \x00', 0xb, 'rose0\x00'}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) fchmod(r0, 0x19f) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 07:58:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x800) socket$alg(0x26, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) 07:58:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:00 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:00 executing program 5: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x4000000000000000}], 0x1, 0x0, 0x0) 07:58:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000280)='kw(serpent)\x00', 0xffffffffffffffff}, 0x30) getpgrp(r1) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) pselect6(0x40, &(0x7f0000000000)={0x200, 0xce2, 0x2, 0x4, 0x2, 0x2, 0x4, 0x80}, &(0x7f0000000040)={0x80, 0x9, 0xffffffff7fffffff, 0x2e, 0x66f7a784, 0xfd, 0x40, 0x3}, &(0x7f0000000100)={0x0, 0x20, 0x7, 0x6, 0x100000001, 0x2, 0x7, 0x4}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={0x5}, 0x8}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 07:58:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffe, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x80) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000040)=0x800) 07:58:01 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x0, @name="1325f2f19eb1d88c169f890b30fbb7fa4040ed77cd0706ac18e778845f8adfd8"}, 0x8, 0x6, 0xcc}) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:01 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='yeah\x00', 0x5) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="00f10014ff0fd9ef4029fcfdfeb3af3e34f500000180000000000000000000007b67"]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000100)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@local, @in=@broadcast, 0x4e23, 0x6, 0x4e21, 0x9, 0xa, 0x80, 0x20, 0x3b, r1, r3}, {0x7, 0x7, 0x591, 0x0, 0x101, 0x7, 0x9, 0x7b}, {0x4, 0x4, 0xe0, 0x1}, 0x4, 0x6e6bc0, 0x3, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d3, 0x3f}, 0xa, @in=@local, 0x3507, 0x2, 0x2, 0x3ff, 0x7fffffff, 0xffffffffffffff7f, 0x3}}, 0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000400)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) 07:58:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006e80)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000000080)=[{&(0x7f0000001440)=""/4096, 0x1000}], 0x1}, 0x5}, {{&(0x7f0000000180)=@x25={0x9, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000000c0)}, {&(0x7f00000002c0)=""/72, 0x48}], 0x3, &(0x7f0000000380)=""/193, 0xc1}, 0x4}, {{&(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000500)=""/132, 0x84}, {&(0x7f00000005c0)=""/110, 0x6e}, {&(0x7f0000000640)=""/192, 0xc0}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000840)=""/199, 0xc7}, {&(0x7f0000000ac0)=""/112, 0x70}, {&(0x7f0000000b40)=""/105, 0x69}, {&(0x7f0000000940)=""/10, 0xa}], 0x8, &(0x7f0000000c40)=""/110, 0x6e}}, {{&(0x7f0000000cc0)=@sco, 0x80, &(0x7f0000000f80)=[{&(0x7f00000009c0)}, {&(0x7f0000000d40)=""/233, 0xe9}, {&(0x7f0000000e40)=""/155, 0x9b}, {&(0x7f0000000f00)=""/99, 0x63}], 0x4}}, {{&(0x7f0000000fc0)=@hci, 0x80, &(0x7f0000001100)=[{&(0x7f0000001040)=""/88, 0x58}, {&(0x7f00000010c0)=""/22, 0x16}], 0x2, &(0x7f0000001140)=""/200, 0xc8}, 0x1}, {{&(0x7f0000001240)=@xdp, 0x80, &(0x7f0000003900)=[{&(0x7f00000012c0)=""/6, 0x6}, {&(0x7f0000002440)=""/208, 0xd0}, {&(0x7f0000001300)=""/8, 0x8}, {&(0x7f0000002540)=""/194, 0xc2}, {&(0x7f0000001340)=""/63, 0x3f}, {&(0x7f0000002640)=""/144, 0x90}, {&(0x7f0000002700)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/145, 0x91}, {&(0x7f0000003840)=""/175, 0xaf}], 0xa, &(0x7f0000001380)=""/50, 0x32}, 0x5}, {{&(0x7f00000039c0)=@nfc, 0x80, &(0x7f0000006d40)=[{&(0x7f0000003a40)=""/190, 0xbe}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/4096, 0x1000}, {&(0x7f0000005b00)=""/128, 0x80}, {&(0x7f0000005b80)=""/183, 0xb7}, {&(0x7f0000005c40)=""/4096, 0x1000}, {&(0x7f0000006c40)=""/217, 0xd9}], 0x7, &(0x7f0000006dc0)=""/153, 0x99}, 0xfffffffffffffff9}], 0x7, 0x12040, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e24, 0xfffffffffffffffb, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x1}, r1}}, 0x38) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x6f00) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:01 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x7f, 0x80) openat$cgroup_ro(r1, &(0x7f0000000180)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)=ANY=[]) 07:58:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0xffffffffffffff4d) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:01 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x2, 0x800, 0x4) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="b2f768c4ff0f00000180db65472300000000000000"]) 07:58:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x200840) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1f, 0x3, 0x1ff}, 0x2, 0x7f}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) execveat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000440)=[&(0x7f00000001c0)='/dev/admmidi#\x00', &(0x7f0000000280)='+#}\\lo\x00', &(0x7f00000002c0)='kw(serpent)\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='/dev/admmidi#\x00', &(0x7f0000000380)='skcipher\x00', &(0x7f00000003c0)='skcipher\x00', &(0x7f0000000400)='/dev/admmidi#\x00'], &(0x7f00000004c0)=[&(0x7f0000000480)='\x00'], 0x0) 07:58:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3ff, 0x101140) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000080)) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000040)={0x3}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:01 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2000ffe, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x11d, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000200)=0x2) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00') 07:58:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f000001ff0f00"/32]) socket$inet6_sctp(0xa, 0x100004, 0x84) 07:58:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="1f6f09b74f442e4c", 0x8}, {&(0x7f0000000180)="f4b99e4a59a28df3752cc29817c882b2fb37a0c8780d73eeaeea353de672df626d35c6b4508e2ed37d59be0550d9fdb452a023e50a75fbd5345623425499746ae85df6b5339a4d39c734494ce7d9ce92bfd538eba801e4d532d1cccf759574f734f943383f9c", 0x66}], 0x2, &(0x7f0000000240)=[{0xe8, 0x111, 0x4, "1c0c335705f48e87eb341a886de9ee644587c7c7b67713ddc09172eafc2e8bdfd1f571cae9d466150076f02582b20690bff80eec704500f79f500658245a984df5623a23c5a02fd7f7df404fd4198bc95923a67ad40be4fdcdede845aa4b95f41c3fb2436f7be4691b5909bf5db3fb0eefc56d72478c0488fd75c2f7c90b5bc26ca54cb6ca2ae154eaed624ed8b3148672d6744b6b60b3c0720104a7e44561d3286a79d162cde8ee2f35e94a513215ccfed9002379105e7972334a326d3dfa820e4634590ac6149780111590ec8115425c93de04b4b323"}, {0x58, 0x13b, 0x2, "ba1470c7a532245183269d0fb7815987f3ff015e050050401c57cba2d42cc74c386bf4d8a54373ee8ca25918c5e3ff4f641b131c2af67eb44d5744caaeadd206e1d8b4bc90d1"}, {0x48, 0x10a, 0x1, "119ba05b1752b09a35abd682138c5340cd39d01e7d357be8c9f7be646063f10c88b4e2c6dd344658776f3107f11c04ed68fc7e0bb4a50968"}, {0x10, 0x109, 0x1}], 0x198}, 0x1) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000440)={0xfffffffffffffffc, 0x7fff, 0x6, 0x7, 0xf, 0x2, 0x100000001, 0x6238, 0xeedb, 0x0, 0x8, 0x5}) accept4$llc(r1, &(0x7f0000000480)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000004c0)=0x10, 0x800) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) write$ppp(r2, &(0x7f0000001440)="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", 0x1000) 07:58:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0xffffff29) creat(&(0x7f0000000200)='./file0\x00', 0x80) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x80, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x3, 0x208000) getsockopt$rose(r3, 0x104, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000240)={0xfffffffffffff000, 0x7, 0x6ea44e12}) socket$alg(0x26, 0x5, 0x0) sync_file_range(r0, 0x3, 0x9, 0x4) 07:58:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:02 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x1000, 0x1}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x40) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd\xa90\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000200)={0x6, @capture={0x1000, 0x1, {0x6, 0x5}, 0x7f8, 0x3062}}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000001805f0c0000000001000000000000004201000000000000"]) 07:58:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280080, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40203, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x17, 0x4, 0x9, 0x1, 0x1, r2, 0x62b4, [], r3, r4, 0x2, 0x3}, 0x3c) 07:58:02 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xfffffffffffffc1c, 0x3) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f0000000880)='./file0\x00', 0x88000, 0x2) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000008c0)=@generic, 0x80, &(0x7f0000000940)=[{&(0x7f0000000ac0)=""/211, 0xd3}], 0x1, &(0x7f0000000bc0)=""/106, 0x6a}, 0x2100) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', '.\x00'}, &(0x7f0000000080)=""/89, 0x59) r2 = accept$alg(r0, 0x0, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000700)="113e928a5b0c0d94ceb1bb124ca814c4", 0x10) connect$tipc(r3, &(0x7f0000000780)=@name={0x1e, 0x2, 0x3, {{0x40, 0x3}, 0x4}}, 0x10) arch_prctl$ARCH_SET_GS(0x1001, 0x3) sendmsg$alg(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xe5, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x4}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0xf6, 0x5, 0x7, 0x100000001}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x2, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') write$P9_RREMOVE(r4, &(0x7f0000000840)={0x7, 0x7b, 0x1}, 0x7) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000740)={'ip6_vti0\x00', {0x2, 0x4e24, @multicast1}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r5, 0x28, &(0x7f0000000380)}, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000428bd7000fedbdf02b80000001125d26e4708000500ff0f0000080003007365640000c9f0f85da900"], 0x30}, 0x1, 0x0, 0x0, 0x4000080}, 0x40800) open(&(0x7f00000007c0)='./file0\x00', 0x2000, 0x10) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r7 = accept(r0, &(0x7f0000000200)=@un=@abs, &(0x7f0000000280)=0x80) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_GET(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f58fb4696a04e525e3addb82e00051ca8e1000000", @ANYRES16=r8, @ANYBLOB="08032bbd7000ffdbdf250300000014000900ff01000000000000000000008000000114000900fe88000000000000000000000000ffffffffb98360e70001cf25d5777a2355d4000b00", @ANYRES32=r9], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000080) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000c40)={'hsr0\x00', 0xfff}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="61a02a2d5a29bac6b53cb7b2ed6056a3393096070eefb375788239e7d8a0e2918d065e63e475a63d553258f21190b0c7c774910c", 0x34) fcntl$getown(r2, 0x9) 07:58:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f000001800000002300"/32]) 07:58:02 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00f0ffffff0f0000018000000000000000000000000000000000000000000000d9042912571a175e192b8a42982a5b1d3cee5cda09e577f1cafbe2411231e0a80b5dadd0917dd2a7e08889e08312a1119025b1a8daf303691b2d00407cb60311464c04d2792ab1a5a98e3ac8e567b6ebf41c1230e27a52c4732c9e22e4ea2ebca0510e355ffc59d14123114e69ae2d22b63b10e91bc1927254f2811202448047bbc6ad85068d039bf0c2daaa99d44af88e0d29c383f47a"]) 07:58:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) bind(r0, &(0x7f00000001c0)=@isdn={0x22, 0xffff, 0x101, 0x80, 0x100}, 0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x5, 0x4) sendmsg$alg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)="853f427160ffad861d3ca553e6d0932dfa91b9ce8e48e2e933c35a994547cd9f9d7d212adeff2197a4dfbdfe830a9e8db878bd2b8277c064f3951044ae55df673007c4a3e3996a2668723f84cae0eeda7835ccb7f894f4627e4c743b9d72fece63503ad45e06005bda75c9e2bf45b4a279dfb4701b66ab87157b9e3a73de19332dd8a8934cf70b82eba5a521dbee49dba2709322482400dfedd764d4e13dcef35bbca2cf58d731d0efab5e0777dfb19a640c4e64c2ccaeaeb6243b6cae803e4d6f3ef69c5746bd3d2bfb8c68b1fe96f442aae446c8593e", 0xd7}, {&(0x7f0000000040)="11e8b7f577f0c0ac510094e303c861a1e4618cab502ba933a0ed27811c95c94ad782eb919c50c4b77c6543d843", 0x2d}, {&(0x7f0000000280)="50d61423a5bb8c02fafb05cb8fa6eee0da307d20198066531fca0d20d33df64157284a01591a47b141f3915d998ae19893a395d2fe9fce1facaed9d63b0b5099b70b45aaf34a588528914b64e01cca06adb3371f676b8718b3bc890c193b139ba014af72fd291451aae135c8a63f7d51a139c547eee77342cbc0f140138ed2bbcf81dc45e2baf1de76b2febc2397f1f54b959a18b6b42d00d7dcb7d125da4541a7aa0b4f276ac225e26284a2ca2cf1b5568d9741241585e32f57666f9611df7f50167ca62105a18dcfdd8108c31bd11bceb6697b6ac49a43744eed003b0898e6c7c579599fa78a2e5e63ff", 0xeb}, {&(0x7f0000000080)="ff37d746252bc8c6d9c0a44871c75167adda402aa9be0570052e645a99266bc583035fa223ff0e839d8380a1b1692d2933222c5b83bdba5ba557726f14ffb57efab9cb51d01d54c6731483e33d500814ad567416af01976dc5655af0bc57871ad878f1f9fb058178899af78990f8eafd596f5a9484cb4d61fd40e741056b", 0x7e}], 0x4, &(0x7f00000003c0)=[@assoc={0x18, 0x117, 0x4, 0x4}, @iv={0xc0, 0x117, 0x2, 0xa7, "367c89e1565f4a1e3b50254463d5a65f306d4e38b1a50624e3007dd6bcad12c1b581594b69e38c09317a167589f22ee9fab7d071ab34a426ba7d451d091d8abafcfa416885fda4a2bb9816d34ce39ef539544abe11f6ab8d7ebac3f496da4ede4a201bd58d8bafc0763daaa4b3560c342d66bc72ede029dffcbaa803484cfb632cfdb63a3040e6295e3f4f25d6c52cd3282566151f76078be947efaae80b74affccbbca1566496"}, @assoc={0x18, 0x117, 0x4, 0x398}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18, 0x117, 0x3, 0x1}], 0x150, 0x4c000}, 0x80) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000280)={0x0, 0x54, "4335896dfa59c69ae1e76e858f383ae3d207e54c44ac2fc6dbfc826fae0ff32a2a780963bbdca55d2bfd2f490e62dd6bfa5088bca2e640baab907df348ac72b7090f0eccf9c520b593c478ef29021a24b0f81923"}) accept4$alg(r1, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x20000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000140)={r4, 0x2}) recvmmsg(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0x49a}], 0x1}}], 0x1, 0x101, 0x0) 07:58:02 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x02\xf8\x18\xfd\xe7\x01\x97--b\xc2s\xccT\x0e3\x1d\x1a\x80\x93\xd9\\\xfb.P X0\x91f\xca\x99E\x1b\xf4T\xc3:\xd4\x94%\x13*\x8d|\x18\x93z{\xd2N\xd6\x89F@\xe3\x8b\n0\xc9\x19?\xb8,K5;\xd2K\xd5\x18\x91lH \xe1\b\x92\x01\x17\xb7T\xd1\xf1\x86\xe5^\x03\xf3YM\x7f\xeb\x1d\x9f0\b\xdf\xb7\x16\f\xbf_\xe3\x9b\a\xe9\xd1M\xe7', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:03 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x2a, 0xb8, &(0x7f0000000000)=0x80000001}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) 07:58:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400040, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) clock_settime(0x7, &(0x7f0000000000)={0x77359400}) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = getuid() syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="64b800072e07eb4b0f72a4ad105acddba01127188601f8afb4cfc428a6d2", 0x1e, 0x7fffffff}], 0x4, &(0x7f0000000240)={[{@nls={'nls', 0x3d, 'cp737'}}], [{@uid_lt={'uid<', r0}}, {@hash='hash'}, {@fsname={'fsname', 0x3d, '/'}}]}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000280)='minix\x00', &(0x7f0000000340)='./file0/file0\x00', 0x8001, 0x9, &(0x7f0000000840)=[{&(0x7f0000000380)="2bbc5e2f199e0113f36a4383ad9aca380c5519eebaf7490c97d05d350c2b38f57874b224e32a585625d5946edb0e93c58962279f74bebc3661931ffcd941e1209f0690dd8e221bd0b59504da94a87aa043a8087a9c52f3552300e19ad462625bcded547ba42b79912db5907c001e73db38775408e9105f9b7d558fe05ec17bdad5af9222584a86ee2eb72090f85f0734d4ec2b4b8b388ca3fbda77b66f13bb5947a4dd68c74206b0c93ad60fded72b", 0xaf, 0x1}, {&(0x7f0000000440)="1126fa619bb16d6ed7f57596ae5b3479d78d3529e658bbfa5ad4ab064cb37e556050481b3c973748d5dc5d2536fae3e802787a047b3cd65cfa69990e6c6a084bcf", 0x41, 0xfff}, {&(0x7f0000000500)="a2edf102fc8606791779835e755d2ae8604d3334c49cb558450637f763e3c8a0949d2451b3e4bb35924e9978aac4240c2b4431ef3f0157084e", 0x39, 0x80000000}, {&(0x7f0000000540)="2fe0", 0x2, 0x7d}, {&(0x7f0000000580)="7fc1aa02f6b32c744d1b4f4a5550f60d8b548060201664f3c4cda1cd48f417c9b3f619b5f2", 0x25, 0x1}, {&(0x7f00000005c0)="10f9f9d59fb1050ba619c2b88066191f2a90587edd75b204d46b93e92a205f76306e4f6982e5ce8299004b40d47013bcc69cef946c8be7508aef4abebce97efdb2526b56208500eb86f4a4e822bc9f7b4c9a84bbf44fc97b06fbc3d8cad80f4d92c7e2846a06bc", 0x67, 0x1ff}, {&(0x7f0000000640)="1e18a827a3feffacd297e4ec6b8717892de08470d9a3979e790498b63662edb7a0bd3e1b14f3cd4815929f125753e11929a09be47755d99c2f125bda96fa480204f0c94c313dfd96994117979f926fe73a0acd008a78ead3860d260b9b1d32bbdd2023988c5ea157aba0698c57fc6d2f5d4185d4ca2eed666125cdca75610eb98dd8fd91d7c460d67a0fd15b3cd064712a7d004302a86e8d68162f407b", 0x9d, 0xffff}, {&(0x7f0000000700)="3b6832458d8175b7c8ac3e266a9a60fe14b995b1fab504fbd6f47a0a03f8e32329768a149c9d332a94139e607051f7c759d4a4069376374d16348d2f528acafcbe77408edeb547bd39f40a2df94636ce24780d29530e5eb806c66e23c0428b9edba860aa4d", 0x65, 0x1f}, {&(0x7f0000000780)="e3fd46a48a3a5f27f31c50515f3cbf5b9c85b80893f063dac85c5d4e53512bacf2096964f771c618e9e5890b00815c963f4b00e0e9e290b13be742643e9b2711220e9a23cc9424009a180c736377e129faf311f940f01672daed05eff2ca2c2b1ac6018e49ae9def93d014e6b2bbb7e2feb28f3b9a95ea6a80cda615f0843ce1597758fefbccc3b6177263b30ba327c4670ed4b2bf5756309884e6229f8a9ce7d4fff53d971265a599a919328f384ce95b0b010b6dc22547d15345", 0xbb, 0xf9a}], 0x10000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001f80)=@raw={'raw\x00', 0x9, 0x3, 0x340, 0x0, 0x130, 0x0, 0x0, 0x0, 0x270, 0x270, 0x270, 0x270, 0x270, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0x130}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x8, 0x1, 0x3, 0x84, '\x00', 'syz1\x00', 0x7}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x6d, 0x1ff}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x80000001, 0x101}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xe6) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:03 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:03 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="e4010000", @ANYRES16=r1, @ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x20000044}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0f0000018000000000000000000600"/32]) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000400)={0x4996, "32602169ea93ea210032c57eea65db8b74dc7122e23e98a605adc7cdfa310521", 0x7, 0x20, 0x1, 0x0, 0x5, 0x3, 0x80000001}) 07:58:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x80000) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000001c0)=0x20) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000200)={0x0, 0x996}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x80000000}, 0x28, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) bind$tipc(r3, 0x0, 0x0) 07:58:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x200, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="020700000200040003000001080006040002aaaaaa0000822134e14583b9da2dc2265b1900"/52], 0x26) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) getsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="3efc38d8869667d7aae9d80d20fcbc856f5fbb4990f0f8331bd3e205c69dfb815fa26727f9005e85617ce7c3ca0f21ba6cbbb1808f87b2a23a54e7e7bacd91928afed9a74cd5c8a5a6ad31e6411fe80e1720e9c0f54375ea3d864ea02e38d84fbf4df5708164c9d0ab05bad16e1f570ef2", 0x71, 0x81}], 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="686964652c666f776e65723e4804a04f7bf0328cb6ed8c322bf70bc8a8830cf81ba40c6850f4fe5740245c67abab35cb1d1462b5958353c681cd603ba2685d3db88094295398a43a41ea636d4db4d04b0fc31d652e179e54d6d85917d7db102bd0252869bf2ff71a59c601d2e99b39ecbfad01fd2ee41e4ed52e37e891782ef55e", @ANYRESDEC=r1, @ANYBLOB="2c6f62167a04b2a94138b56f6551cfab896a5f757365723d7365637572697479757365722d656d302876626f786e6574312c736d6163d6583ddf6b66736465663d62f768710a5560bca09ff2d7284b7066002c003839aa1d84bc15e40e1b8aeffd0cd5d0a3a732f6555ddc9e13b1cddbee2043d05be2d7e21e44ee20349399b3c9a849f7bfa13e9325916579a4e109ef1df9074b5b9a3605a3a6c855c644a71ad974acd803027713438340859a267b61b36fa83217f8f7d8ddd94b894d0689e701aadacc80eabee3e5df357ec85da2dda6ab69a72d0f462ccbf37cba7ada866312fe7c55fabd"]) 07:58:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x208) semtimedop(r2, &(0x7f0000000040)=[{0x7, 0x100, 0x1000}, {0x0, 0x1, 0x800}, {0x1, 0x3f, 0x1800}], 0x3, &(0x7f0000000100)) sendmsg$alg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x3, 0x4, 0x4, 0x100000001}) 07:58:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:03 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f0ffffff0d000001800000000300"/32]) 07:58:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003500)=[{{&(0x7f0000000000)=@isdn, 0x80, &(0x7f0000000680)=[{&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/123, 0x7b}, {&(0x7f0000000280)=""/96, 0x60}, {&(0x7f00000001c0)=""/45, 0x2d}, {&(0x7f0000000300)=""/197, 0xc5}, {&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000500)=""/163, 0xa3}, {&(0x7f00000005c0)=""/37, 0x25}, {&(0x7f0000000600)=""/82, 0x52}], 0x9, &(0x7f0000000740)=""/27, 0x1b}, 0x4}, {{&(0x7f0000000780)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000840)=""/85, 0x55}], 0x2, &(0x7f0000000900)=""/28, 0x1c}, 0x3}, {{&(0x7f0000000ac0)=@nfc, 0x80, &(0x7f0000000940)=[{&(0x7f0000000b40)=""/113, 0x71}, {&(0x7f0000000bc0)=""/74, 0x4a}], 0x2, &(0x7f0000002440)=""/4096, 0x1000}, 0x215f}, {{&(0x7f0000000c40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000cc0)=""/235, 0xeb}, {&(0x7f0000000dc0)=""/199, 0xc7}, {&(0x7f0000000ec0)=""/214, 0xd6}, {&(0x7f0000000fc0)=""/90, 0x5a}, {&(0x7f00000009c0)=""/43, 0x2b}, {&(0x7f0000001040)=""/19, 0x13}, {&(0x7f0000001080)=""/195, 0xc3}], 0x7, &(0x7f0000001200)=""/10, 0xa}, 0x34}, {{&(0x7f0000001240)=@nl=@unspec, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001340)=""/87, 0x57}, {&(0x7f0000003440)=""/192, 0xc0}], 0x2}, 0x3ff}], 0x5, 0x2003, &(0x7f0000003640)={0x77359400}) 07:58:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:04 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x32d, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1880, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 07:58:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00f3ffdfff0f0000018001000000000000000000000000ffea960e0000000000"]) 07:58:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x400000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000140)={0x80, 0x4, [0xfffffffffffffffb]}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000180)="4971642501becfd2169f9edeaa6e9b238b369a9ff9c238dc808b442cd812920b443d5c412923ba2574e56b44abb8", 0x2e) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000100)=0x1) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x58) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000140)) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x480000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, &(0x7f0000000180)="904aec4a10027f8bd6ab315687dbffc496cbeead017fd94dc5647235b28fc6d58b0b7d8e93a3cfb74836f81ee91d0a853defa238a9665a57784996c74ef7254083c4e722be9f5c7372b6c193ad9faf821eadbc578b899c64c533c5bf1c65cb72052b245e91fb2547658149d2fc0a8e22956ef9f10b288d1ff31756a3a659a8679d3d7c0a6dd0cc665fef908e9757c88ee78fb1c90a20fc9b9eab8e966e91d5e94aa942909f9073d7c5a829de1ded4c687d833df2ba2edebcacd3d8e5b575ae2aaac8b6da6759eec0856859e2b6466839c2336893874e", &(0x7f0000000280)=""/247}, 0x18) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r4, @ANYBLOB="31032cbd7000ffdbdf2503000000500002000800040009000000080005000004000008000500000400000800030002000000080003000400000014000100fe8000000000000000000000000000bb08000b000000000008000b000a00000008000600020000002c000300080008003400000008000300030000000800030003000000080004000100000008000100020000005c000100080005000200000014000300e000000100000000000000000000000008000b0073697000080004004e2300000c0007001800000024000000080009007c000000080001000200000008000b007369700008000b007369700008000500010001000800040019db0000280003000800030001000000080004000300000014000600fe880000000000000000000000000001b52778a09aad029f5abb83fdc77b6b740e6a18e692d1595d552fd2ee3505ba07af0b7bb6af1584df024692d1eb4b9106cbd19f42e292f48155cac9a27eaad80f3d95be1bd5d9a8ccab3b4721f34173a7ffcdb93eb7c6fbc6f06624bfc717efd96d4fcb5fc269bd3880990c4cf429769ae5ebcc401263d795039302bcca6fdc1dc43f45287db8242659d723eb2da50ba22d5e7c15965e0278a98710f6b0128c572f0b6dbd218d2bcebf7d93"], 0x12c}}, 0x40000) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:04 executing program 5: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:04 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:04 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2, 0x42) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x48040, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x3, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x80000, 0x74) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:04 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x8, 0xbaa5, 0x2, 0x3}) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0xb4) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4}, 0x40000) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/199, 0xc7}], 0x1, &(0x7f00000001c0)=""/64, 0x40}, 0x9}, {{&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/223, 0xdf}], 0x1, &(0x7f00000003c0)=""/9, 0x9}, 0x5}, {{&(0x7f0000000400)=@caif=@dbg, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/158, 0x9e}, {&(0x7f0000000540)=""/5, 0x5}, {&(0x7f0000000580)=""/78, 0x4e}, {&(0x7f0000000600)=""/72, 0x48}, {&(0x7f0000000680)=""/205, 0xcd}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000840)=""/193, 0xc1}], 0x7, &(0x7f0000000ac0)=""/191, 0xbf}, 0x4}], 0x3, 0x40000000, &(0x7f0000000940)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000009c0)=0x804, 0x4) 07:58:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:04 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001, 0x5}) 07:58:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000040)={0x4, 0x3, 0x6, 0x1000, 0xffffffffffffff6b, 0xe, 0x17, "f2b7b5b7072610842e5bb5bac5e23a84d743605a", "b4f2197d5b2a52dd1bee74d7a6ce57631d1c5cff"}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r1 = socket(0x1a, 0x5, 0x6) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x400}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 07:58:05 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) sendto$packet(r0, &(0x7f0000000100)="c7ab479502644dbd10f1296336c4ab6e68452a6957369b9d42c74d18be9d2cf6e05d1cfd1a7c35df3761e3d791711dd5669370b4b04c9d3d6b2533c144925c1c5b89500fcf50e86640fb77c4f536f35a38bbc3ce9f26731f48e737386206425f9b6d5d3c1946ff77d2a0ca5c67587bcf963c90f369128ceb41c56c0c5f62c74dda53f3574d9f275f816bfa0b853da12c71f94e3a4461338a32396f4588f0845f027cb03978f6a1f6176d7ea31930", 0xae, 0x4000000, &(0x7f00000003c0)={0x11, 0x17, r1, 0x1, 0xfff}, 0x14) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 07:58:05 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f00000001c0)={0x90}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240)=0x1ff, 0x4) 07:58:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x2, 0x0, 0x0) 07:58:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000200)={{0xa, 0x3, 0x6, 0x8000, 'syz0\x00', 0xff}, 0x1, 0x3000000a, 0x7580, r1, 0x5, 0x1, 'syz0\x00', &(0x7f0000000000)=['vboxnet1*\x00', '\x00', 'memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', '})}$uservboxnet0%\x00', 'memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3'], 0x7f, [], [0x8, 0x7, 0x20, 0x2]}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r0) ioctl$NBD_DISCONNECT(r2, 0xab08) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1, 0x0, 0x170}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e22, 0x7fff, @local, 0x5}], 0xffffffffffffff06) 07:58:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x14) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001200)=0x14, 0x800) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x14000, 0x0) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f0000000040)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001240)={'team0\x00', r2}) 07:58:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) accept4$rose(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xffffffff000, 0x8001}) 07:58:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x84a89f01c25c8b0a, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x6, 0x0, 0x0) 07:58:05 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000640)='./file0/file0/file0\x00', 0x1) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x100) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sco\x00') getsockname$unix(r0, &(0x7f0000000340), &(0x7f0000000240)=0x6e) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x5004, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)='wlan0ppp0-\x00', 0xb, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0xb7, 0x5}, {0xfffffffffffffff8, 0x100}], r1}, 0x18, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x588f, 0x0) 07:58:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0xb4) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) sendmsg(r1, &(0x7f0000000680)={&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x2, 0x2, {0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x13}, 0xa11}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)="b0f6e5e227df9f6c6283bebad24a9dfb818bee5e169464b000ec876b04f1a1e4c4599eca1177a3ca517c9323cdf12d97b9fc6595ff33ce07b71a421e3896201f157a48151f3f03fec6c1fa", 0x4b}, {&(0x7f0000000340)="dc0e8f9be1d2197e791e0f9e638f0df073269340750678f8c8dfce23cf049cacb64c614c6a91f28ef431a23e773e6dae373e5a750c77481ec52f4b369b3787fb053e5297249d9f5ab157f9efcab430169de8d5c558b5ae87309949e63925936945a24fd2866627f44a0419e9c8f5a4de951990f19c2e7063f5f40a8f4871bfaf7ffbc37d424b3e23c46b7df832e0c4abc805d2ad6d6c656ee5d9053672ea4b8de802", 0xa2}, {&(0x7f0000000400)="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", 0xfd}, {&(0x7f0000000500)="20e8ef81341287fc9fbeeda371dd71f459d3ec1f20628e907734757be1cef3f754dba0a3a9005460b07755e7205434f712520ede952dd6cf02cd450df9186a17c24969a238eb32f8e9c28cafd158a0e05d3aed0b718148563970eb4f94b9501a787fd71cb326412881e090ea463bc2c40de10f8d5b4236eb52ba8c898f8f51fe4dd74d00f3d51db85dd56fb1786794564cc5ae2ef0526af2327bc42d25ebdeafca45ead4241723d36b66226bb008145f40a51200008f1ec041c10743a4e2a287dfdc112e0e9e039ac4f9ddfbf5858a8358e35014cb6cac6b52f68eac78a8de65c42da8691700f68daa82f7", 0xeb}], 0x5, &(0x7f0000001440)=[{0x1010, 0x105, 0x100, "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"}, {0x28, 0x189, 0x7, "d68933dd78d84c41f68b1524432796a97e04f915"}, {0xa0, 0x108, 0x1, "ecda9b7fd5e6c447ec8ca119f2d1ee0dfc94dfac85479315e6b537bb1f0e432f3e827f57ee8a296fee5fb44bee09f916a3792012987e0dfa5601e931ed76fe45313a50afc2840a165f9c9310db35528bb772c4b1039fd6bc9cf502306722df0c1f6bbc390a69baf165e3a7a060e31b61558a15d478b28392e1f3802f15e4e4a7aad35df5cafe2789cc77848eef8f8dc9"}, {0x28, 0x117, 0xc30, "602a695efe9d74204a7342aba88fd040c1"}, {0x60, 0x1, 0x7f, "a4c737a1cca8d3757ba1ccc82975c37b766193d02c28cd68c9a48baf8b8ad78a60e63488a219995e9a5ceb3c7738c61d329a69eec63beb611a81d5349b7624de3d56e9b6999c797ba6c5aa1d8a0260"}, {0xb0, 0x101, 0xf13, "439b0ec031011ad67dff8af3bfbbb0f5310029cece7be7b2d0c85d9b22a8087e09fbf75e98b6e8fba7b26b5625980fb41ada0a782803a5b79ee6b8695f51b810f50362b313951211c1197713a5f4d0420be23eeecfd717c2706c3f9c95ba8dc1568533fad2f665f30193e09ef0d82329a07015efbec88d5f4907b9fa5bc889f8988144534154d7828a0e7fd51e853b01dcf62067c22977aaf78581"}], 0x1210}, 0x48000) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2880) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000140)=r3, 0x4) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x8, 0x0, 0x0) 07:58:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) 07:58:05 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0xb4) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x2, 0x0) 07:58:05 executing program 5: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffc39) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000100)="b55368cea2624c41753804f96f6e30c3e74c600cb89bf36f95023942be0bd17ff28130dd73f11baab639cd8d64761f8563ee471d6cc41da3bfe0f8104938540c00643d140bcf0d6de23b837d0bc1bfc4f7307d85b4341a75f0", 0x59}, {&(0x7f0000000280)="d95b8487ac67334c4934664c96efb0f9323c5c81d4449f8f42fd20ead90100a49c08ca719059966ffe8fb8646e49563aec37e6dbc8a9a0a0362c04920885103ad47cc7527553d4850ed3e17faf6fda173ae4afe1afa3e832aab1e20a8cf7416af836c21f7e1046c0b2be4cc006ff2b961839ba1c8b5ab2dee8e75ebf600b8c904aed047bcddd03b72ca7111a648dce4ea1d4664f5a172916ab2137eb7c5337c8d504600d1b4a89757a40e3f6d1", 0xad}, {&(0x7f0000000180)="f3a45e85803f20df523052dbce3ec1ca884f43e46562e7a4d2c9fc1ed9f301d6b6df5544c29d29c0aeb4b2cc82c9472bcb97eff69cb3930e540e90c577355c9add1161cad07cda9fa7dcfc353b4a042808ba4c499c829163ba", 0x59}, {&(0x7f0000000040)="0f4e4cb79915d3bd4dca9aceb637faa137f80a31cf67d8d2a6b281f578f896bc6454a8c54eba93ccd211b31dcfa9a30cb1d40986", 0x34}, {&(0x7f0000000340)="f49cf9abba76b42b8e86c740c030057cf12144cebc37df9c3e1ad218e39643e0a73f4759d12d52644d61b28f511e1210cd97a714eb7751a405296550e4a70e3d1cd09ff0c4f0a900d5d306005dd255cf426a9db51b7a9d1351b7fa485c0ff859994a2c0d8f0aacb418896d2b5af2767475fdd91316d4c3489cf12d28f1518b25a2d8c193f762dc3ed2b0edc4fdcb6446634b278c5e4eca4e7ecebcd99b329d7f7c09f5a2aa97b515a5adc0897713272fa79e1eaca4db66fb4983fdcb0b2e646a171e394a7c02f41d716e40437496397e3495fc", 0xd3}, {&(0x7f0000000440)="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", 0xff}], 0x6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x111000, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 07:58:06 executing program 5: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x3, 0x0) 07:58:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setregs(0xd, r2, 0xfffffffffffffe01, &(0x7f0000000400)="3f0ec21d581c11cbd7b7ab6cb59925953227f0c4d41ffc75ea745e7aafc45a42b412d0478a6e088f2c71d478049eba6d5b078f3dd0be3d8e0a34c322128dbc3668bc8556367d072f9094a99ca86786e157951cb32b6b2c103cc8f4160d253a17cb093a8b") r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="05ed656d6f72792077d1b6ff8193b7bf5f649b4586b596b3c6d717a6ab57f74c4f14a9389dca76aa15e2973d9382e03918570df2bd404094ebcd6a965d01a1af4e5b27dea98423d55737966f884f61644d5cee11570ba04b1962bda893fb394c3d1e4ff6391ae2cb9020c6bb847e5e58ea7b2f7700438dce00f7f2"], 0xfa38) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:06 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:06 executing program 5 (fault-call:11 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xb8, 0x0) 07:58:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0xb4) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x1, {0x9, 0x1, 0x6d7, 0xbb2}}) 07:58:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x300, 0x0) 07:58:06 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:06 executing program 2: execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000140)='bpf\x00', &(0x7f00000001c0)='system*vmnet0system{vmnet1(\x00', &(0x7f0000000200)='bpf\x00', &(0x7f0000000240)='keyringcpusetem1proc/wlan1^\x00', &(0x7f0000000280)='bpf\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='bpf\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='bpf\x00'], &(0x7f0000000640)=[&(0x7f0000000500)='bpf\x00', &(0x7f0000000540)='bpf\x00', &(0x7f0000000580)='bpf\x00', &(0x7f00000005c0)='bpf\x00', &(0x7f0000000600)=':\x00']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = open(&(0x7f0000000680)='./file0\x00', 0x80, 0x40) fsmount(r0, 0x1, 0x5) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:06 executing program 1 (fault-call:13 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:58:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x4000, 0x0) 07:58:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x4}, &(0x7f0000000100), &(0x7f0000000180)={r2, r3+10000000}, 0x8) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xb800, 0x0) 07:58:06 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) [ 514.092604][T22431] FAULT_INJECTION: forcing a failure. [ 514.092604][T22431] name failslab, interval 1, probability 0, space 0, times 0 [ 514.127196][T22431] CPU: 0 PID: 22431 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #19 [ 514.135241][T22431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.145311][T22431] Call Trace: [ 514.148629][T22431] dump_stack+0x172/0x1f0 [ 514.152986][T22431] should_fail.cold+0xa/0x15 [ 514.157599][T22431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.157625][T22431] ? ___might_sleep+0x163/0x280 [ 514.157648][T22431] __should_failslab+0x121/0x190 [ 514.157671][T22431] should_failslab+0x9/0x14 [ 514.157685][T22431] __kmalloc+0x2d9/0x740 [ 514.157705][T22431] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 514.157727][T22431] ? rcu_read_lock_sched_held+0x110/0x130 [ 514.157751][T22431] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 514.168416][T22431] tomoyo_realpath_from_path+0xcd/0x7a0 [ 514.168430][T22431] ? tomoyo_path_number_perm+0x193/0x520 [ 514.168450][T22431] tomoyo_path_number_perm+0x1dd/0x520 [ 514.168462][T22431] ? tomoyo_path_number_perm+0x193/0x520 [ 514.168478][T22431] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 514.168493][T22431] ? __f_unlock_pos+0x19/0x20 [ 514.168521][T22431] ? __fget+0x35a/0x550 [ 514.236275][T22431] ? __fget+0x381/0x550 07:58:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x100000, 0x0) fcntl$setlease(r0, 0x400, 0x2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) [ 514.240448][T22431] ? ksys_dup3+0x3e0/0x3e0 [ 514.244873][T22431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.251122][T22431] ? fput_many+0x12c/0x1a0 [ 514.255555][T22431] tomoyo_file_ioctl+0x23/0x30 [ 514.260334][T22431] security_file_ioctl+0x77/0xc0 [ 514.265285][T22431] ksys_ioctl+0x57/0xd0 [ 514.269448][T22431] __x64_sys_ioctl+0x73/0xb0 [ 514.274051][T22431] do_syscall_64+0xfd/0x680 [ 514.278566][T22431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.284467][T22431] RIP: 0033:0x459279 07:58:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x30000, 0x0) [ 514.288375][T22431] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.307986][T22431] RSP: 002b:00007f320ff8cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 514.316400][T22431] RAX: ffffffffffffffda RBX: 00007f320ff8cc90 RCX: 0000000000459279 [ 514.324378][T22431] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 514.332357][T22431] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x680) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x200, 0xffff, 0x3ff, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) [ 514.340337][T22431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f320ff8d6d4 [ 514.348396][T22431] R13: 00000000004c235a R14: 00000000004d5050 R15: 0000000000000007 07:58:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f0000000100)='sy\x7f0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:07 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x2000000, 0x0) [ 514.694733][T22431] ERROR: Out of memory at tomoyo_realpath_from_path. 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = dup2(r0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000280)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000100)=""/37, 0x25, 0xdadf, 0x1ff, 0x6, 0x1, 0x1}, 0x120) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=ANY=[@ANYBLOB="74010000", @ANYRES16=r3, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x24040000}, 0x40010) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x400000, 0x0) 07:58:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2000020, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x40000000, 0x0) 07:58:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x4, 0x9, 0x9}) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000200)={0x3, "172cd2c7634b6a5d3e1a21d2cb7604962acf3989f71f906440ffd015461d7c6c", 0x2, 0x100000000, 0x1, 0x0, 0x7, 0x4}) 07:58:07 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x8dffffff, 0x0) 07:58:08 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 07:58:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000b40)='/dev/adsp#\x00', 0x7, 0x4c0000) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000b80)={0x2, 0x2, 0x6, {0x9, 0x4, 0x8, 0x1000}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x20000, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000800)) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x1, 0x111002) sendmsg$kcm(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@isdn={0x22, 0x9, 0x5, 0x7f, 0xc43b}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)="228051364568c007116322cd0f3f0daba242af996441847df85cd8fddc900fdef3b642a5e065933c499558c8d45303", 0x2f}, {&(0x7f0000000340)="ef9fed2a018e0dc13e66f6fd325cc111790acaf8ed31c3dd665ce444ec1f0da53fafcaab9d565c1cb1304e9f5c758492e31291e01365ec2aea9f7f362b65e5e14cd93d80b6d47b624d00f86bda3bbc5dc971e0088d41f94a8e5e363564c7d3bb1dd3d60ab817e8d5a9d4c1d21e5cc142a4f7688219d235f5b0e736ca9cee69ce709e77ab74309886007bfe557a33392f1ea6ad774eb71aa38f887193fc292c6ff4d629abab0997507a38391e1b12906d9acdb15d934b40858bab514e860694563c8ef9e7bf546ca182c811db94abc5518062140b6680582b9e0ab7ca2a8ec65f14d4177e8018150320620da32ada16399fb13a1390", 0xf5}, {&(0x7f0000000500)="055c20b1e84674623e920745b2ef2b5bec64691f6d652e2d89ead939681fde04fa5949c28d52237c95f76822e269603bdea9eab344e311e22a8ecebe654a95a8391063b0c3c251aed3d7f0ac2245d63365e9d7926775a3220316bd4d9c37d2945db2c05044de290bdcc036af1913e8a35b6aae04375b5e6e7f176de424ae45fbf94a02e63363e6a5d6d2270125638ecc9a8f135a667f9f6481cf3bb1818c27ff25f377d4d2c93a8db70a212499e19a0c242ac6a2348f563b71df92cca90c54f16287fd532b4be5414baddef4661727afb7b78ed35b4ce7", 0xd7}, {&(0x7f0000000240)="c59a751291c68d49860eab074516c87aa99c94746544f4cb80fea00467e95e535310d9089d37301a", 0x28}], 0x4, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1c8}, 0x48000) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000dc0)=""/199, &(0x7f0000000480)=0x75270819db399231) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a00)={'vcan0\x00', {0x2, 0x4e20, @multicast1}}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) getresuid(&(0x7f0000000a40)=0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000600)=0x3f) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000b00)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xb8000000, 0x0) 07:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x2, 0x0) 07:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:08 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x20000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000280)={0xfffffffffffffeff, 0x0, 0x0, 0xfff}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000380)={0xff, r1}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockname(r2, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000140)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xf0ffffff, 0x0) 07:58:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) 07:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x10, 0x0) 07:58:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xffffff8d, 0x0) 07:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:08 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x400000100004, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4c01, 0x0) 07:58:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xd) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000440)={0x23c, r1, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x21}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff0000000}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xca6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffb}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x158, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff8000}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x385}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffaee8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) openat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) getsockopt$inet6_int(r4, 0x29, 0xff, &(0x7f0000000040), &(0x7f0000000100)=0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r7, 0x4) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xfffffff0, 0x0) 07:58:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) fcntl$notify(r1, 0x402, 0x10) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:09 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x3000000000000, 0x0) 07:58:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) stat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000100)='bpf\x00', &(0x7f0000000140)='./file0/file1\x00', &(0x7f00000001c0)='9p\x00', 0x10, &(0x7f0000000340)={'trans=xen,', {[{@posixacl='posixacl'}, {@cache_loose='cache=loose'}, {@debug={'debug', 0x3d, 0xfffffffffffffffa}}, {@privport='privport'}], [{@obj_role={'obj_role'}}, {@euid_gt={'euid>', r0}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}]}}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x5421, 0x0) 07:58:09 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x200000000000000, 0x0) 07:58:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x62) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x5450, 0x0) 07:58:09 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb880009ca8e8bbb2c3407c390e5a6538bc000f6b5c7fb6b6a5b5c5f7328bca60897e232bc8b7e51681577cea112072401a6864a5ee4351573cb7eec99a34214d5d3b715f7ed2ba4752f7318e46a23839720b93534ba03b195811e75da35bac9274a1be04911ac3f03f3e1e41d5bacdc31156f5b9e6aa1"], 0x88, 0x3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000000)={0x3, 0xffffffffffffff9c}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0], 0x2}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x3, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000340)={'gre0\x00', @dev={[], 0x14}}) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x4000000000000000, 0x0) 07:58:10 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x549) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x0, 0x600}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x8dffffff00000000, 0x0) 07:58:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "f61ef9c288cb27b50dd1d068b995f06033963092"}, 0x15, 0x1) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x800, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 07:58:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xb800000000000000, 0x0) 07:58:10 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x5451, 0x0) 07:58:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022cbd7000fbdbdf251100000044080000000000000062726f61d66f30fbff0e9a8cf48ee36e6b000014000799000800020002000000080003003f0000000c00070000000200000000000c00010073797a33"], 0x58}}, 0x40000) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x10000) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000100)={0x7, r3}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xd7) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x10000}], 0x0, 0x0, 0x0) 07:58:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ftruncate(r2, 0xfffffffffffffffb) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0xf0ffffff00000000, 0x0) 07:58:10 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x5452, 0x0) 07:58:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000001c0)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x8400, 0x48) 07:58:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000005340)='/dev/input/mouse#\x00', 0x7, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000005380)=0x1ff, 0x4) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x4, &(0x7f00000002c0)="c4dc00055e03cf017ce070df39a981b57e15bb71686ce259ec6e37114d3b44c6c5c0e5c99c86e669") ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000300)=0x7fffffff) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@assoc={0x18, 0x117, 0x4, 0x8}], 0x18}, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3950, 0x200400) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000180)={'hsr0\x00', {0x2, 0x4e20, @remote}}) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000280)=0x4) fcntl$setsig(r3, 0xa, 0x3) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xdadc, 0x4080) recvmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/15, 0xf}], 0x1, &(0x7f0000000240)=""/61, 0x3d}, 0x20) 07:58:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') read$eventfd(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:11 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x7c9, 0x0, 0x1387d4f5}, 0x6, 0x8, 0x5}) 07:58:11 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x5460, 0x0) 07:58:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) ioprio_set$pid(0x2, r3, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fremovexattr(r2, &(0x7f0000000100)=@random={'osx.', '\x00'}) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)=0x8000) socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4407e, 0x0) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000180)=""/30, 0x1e}, {&(0x7f0000000380)=""/142, 0x8e}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000500)=""/115, 0x73}, {&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/15, 0xf}], 0x8, &(0x7f0000000600)=""/91, 0x5b}, 0x40010120) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000890f, &(0x7f0000000840)="c0dca5055e0bcf32e76b11ceefc8ec7be07054d575e433ff1bb49896885709a47d1e8f9c19cd9048b3cdd2f18d40432c04f374d78e3ca3ab84efcf6f3e7391dc321826ca662e643fb609fbb91536802db50a2a439be18473e9d8f18ec4b23df29b4ae9af2e5b8e73c7e8a6fdd2a2c2ca37aae99545f2c633b7750f0bbe94f00efbb5f5cbfedcf427b5742bd6955e486304c6a383feb2e1f0cbc115af1308766c79d699706f338617dbecdb027be6cb1eca00352d07bbac4e244cb61db366dee9bc3964469d97b2b70b5bb80099e76339a627a2dd772fd4e84b") ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nlmon0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000000740)={0x1d, r4}, 0x10) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000006c0)=ANY=[@ANYBLOB="0300000000000000040000000000000002000000050000000800000000000000000000400500000004000000050000005700000000000000020000c00500000000000000000000001ead000000000000"]) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x102, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=@profile={'changeprofile ', 'cgroup\x00'}, 0x15) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='kw(serpent)\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)='kw(serpent)\x00', r1) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 07:58:11 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0xc080) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @loopback}, {0x1, @dev={[], 0xb}}, 0x20, {0x2, 0x4e24, @empty}, 'vcan0\x00'}) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x6364, 0x0) 07:58:12 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x7, 0x10) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000100)=[0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r5 = getgid() semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000300)={{0x3, r2, r3, r4, r5, 0xbe, 0x8}, 0x5, 0x1, 0x9}) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4, 0x99c, 0x5, 0x3, 0x0, 0xfffffffffffff19c, 0x480, 0xb, 0x4d, 0xffffffff, 0x9, 0x3, 0x9, 0x3ff, 0x40ee, 0x1, 0x8fc, 0x2, 0x401, 0x81, 0x9a, 0xc7, 0xfffffffffffffffb, 0x100000000, 0x80000001, 0x7, 0xfffffffffffffffd, 0x0, 0x5, 0xb1, 0x9, 0x5, 0x87de, 0x0, 0x8, 0x0, 0x0, 0x2, 0x6, @perf_config_ext={0xa86, 0x8}, 0x100, 0x97f5, 0x0, 0x7, 0x6, 0x6, 0x7f}, r2, 0x4, 0xffffffffffffff9c, 0xa) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x131}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0x3e}], 0x1}}], 0x400014d, 0x1, 0x0) 07:58:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-aesni\x00'}, 0x415) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffd39) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000580)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x3, @multicast2}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="3d5e1fa5fd2405b592f5d083ef8a4ffb31477dd5a4d9325fe1f653cd7048adb0e333323214f27f7144d5", 0x2a}, {&(0x7f00000001c0)="65e38017", 0x4}, {&(0x7f0000000280)="24dfffe4af6ff240a484c7cad99774acf6346afff938db03c6539bc0689a5991dac16b22284df0aec605e5c338ae814cd73027bfed05aef318c0375498aec88d16d6d9deab9e96da", 0x48}, {&(0x7f0000000300)="a913f46eb3", 0x5}, {&(0x7f0000001440)="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", 0x1000}], 0x5, &(0x7f00000003c0)=[{0x80, 0x139, 0x5, "701885f8bebc9384b906c836de010bf1444f50d89da596373e91178d20de41b59b6f2de9ada3eaf1ac0c8c410ab5d8ceaa0b2b2c642efc0c1f3ca110cf7e783818ad63c348580bdc73e7ce7572efc8451b4b75a472d8ec1055d9a8605f3428168bc2d54eb7c4fcb52a1583bc"}, {0x70, 0x116, 0x3, "7fc0f7b7ebdc9a103437768bfb9dbd83b24208bfca80aa3b478f9df78cf20b6dd8df22e1c28e1159244736ec809dda2c18f6749e508743d4218d2cfed6b4a59f12fced62f4e3cc9bef7bfeed6f1c9d8329480361a50d2cf3b849"}, {0xd0, 0x114, 0x8000, "bafb69605ddba29f6860602ab6039fda5933b5d2d510b4964b5e79da44647c71e692bcfb7737ac3c4054cf04fca6df81e00e6354c651e1c3bbe8f0123ce0751868c4e5c32eb57fd0d8f8a4e11b03ba29301ad831900f4137f660256b4bba9ea659220b84269068011d388b71121e553dbe80f20cb298cdeb76f185d022fe5e336708fc0b396fa98080072bb09c4952afb95dc229a7ab8c85d96fc72438e57ff47f29705b452d114243ff829b7fd35f61651e0ca29670841b2a91d3893ef2baa3"}], 0x1c0}, 0x810) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:12 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x401, &(0x7f0000000040)=0x0) io_cancel(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x100000000, r2, &(0x7f0000000200)="369c3667192ffba801501a0f4af3d681607521feaca45653d57e093d212b9af4b5f6db97809a7ced52cd2c82c6a91a20f9ed2fd4d80c0f1f4aeb752d3d05655e91255c2495641814fb0bd7f1fc85ccd186af9551ef66543b108fa71bb4500973972a0247cab6", 0x66, 0x6, 0x0, 0x1, r3}, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000300)=0x0) getpgid(r6) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x8912, 0x0) 07:58:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8000, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x9, @loopback, 0x800}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000340)="f12ae938cd08cd25f5c76274c4d09306c192418e598b4035a5879565f427d9aa19de9f78672ab658716f9adb4f061c7bccbe29ca57d4693a0d585fe3d752e37c5a7b221621d081010fc060c148c19a2e84d77a9270b9d30c441c02c7f2358db87b7b22c602092fc334bb7d34b1c1f12c9ecb93901b9105acd4d49d4080b7f43a1f47465c7b76565efef97812dbe262dd8884aa0e232935f47b3a28553ff3f57c23abcf07c7635f7abe68234cd98e28191ba40c41ec", 0xb5}, {&(0x7f0000000400)="489ec7ba9923e4c880ecb9446289415d3f7d094c32259421aa00b7bdd2e69c2faa0c0681dae8e8e65e8622c719e9c0db08a8798e1f4913d739e8801c9d046f9fb914bc262bf791e20dddaedd9dcd68d95b4d134d3f9f4a60e42f0fd4b9fea82a1e787cad566b359a0559e791328bc371190b7eb45eb6b0a5d2ceeb7148cfe44b48d1a2300ce181fa674fa4a330b58ecf9975a51d5c9924bc83a7240991337ee56d49e93ab00c8b45ded2aacede087c670ad0a9c5c35f18596231bad601", 0xbd}], 0x2, &(0x7f0000000500)=[{0xa8, 0x115, 0x3, "dc3e286a564727c64ad071516f6f42f6561c7f8589bf04685079821f9020c9feae1a3403e79be5cde9b93bc86807077c1cab0c46b3e17b4a432cfe08f10724753f636376f18f0a32e50b902e573b255238ad95e3c6a6de400644ed2981abffeeac39c3b041d6e1d520419d436c6b4a6e3c15e768260b729dea5b8d8887ce0b7a9a42b9debd020b4cf7030e74efcf06b7fe756117"}, {0xc0, 0x18f, 0x0, "ecb233d686389d461fcf32730106cbe4ebc74d29f58515f723712213e035f5d0841ee1eb92388d3f6cd4cb0fd16b641b271956161ada9da2042e2a6b4e15e66ce0f1125e5874add0bdad0a43124dd72060045a1e3e21efa0369eed9c0a313802aa2101b754f29d9a7f8debd8fa8e14fb68ecb0a86277afa60b9e9db4eeabeb915918279e8094491fc5b01214b1a3689b5c6f67ed4048039dacc01e46f444e429ce7e26dbd07a6f5eb0fc04"}, {0x78, 0x0, 0x2, "104bc62d4ab39cffca4d9e8281ceae03f4e2c01ff11be8a7cab106550e12d66eb72b7bfe361514371a67183a51369f7561278e2fbf777983a6a42bda4d6751d376275ccac6e51be8d6f4db884a1a87b7bf561c4626040e262f669f8f69be99cf053144a4c8fab81a"}, {0x40, 0x10b, 0x0, "8e8542ba35eb1a1e76ec2123518a4b4c4a6697cc5df2de4913f8c4e6bfef7628b0ef43ce75cc3345f5419af0ba"}, {0xf0, 0x117, 0x0, "18a7bfb1938f1d8f572d6e5495559d41dc002374f3f1e5039dc440ca8c6e6dd361deb99e98a13e78fced54c46737c17071530f9aea4ca584eede325a75bd9e59907513693a77e3554b18ad63701f36a057759e00cf7ba809d01ead446d7ac674fd455177f3b93cbf58738d771b25ed6e3a8f95d89e4d338cb3e6286f6a9e0837eb7b05032846da55531149e7f051dda0216f9457fd43e62943a3d972eb768175aec8a119b0cac8c506328eafd176493f12192ec0f7b06b7e65355c4d6af137a8da668d3ca2824910db121ac40a97fc87c6a9fc29c2ec19341170cb78e1cf"}, {0xa0, 0x117, 0x0, "5799416aa5404cc1e400116e26fd5e2d4ffa9982518a13a4de31a8757077f226bd0bf9b0871b46a9fd9287ffbc85a3a54f50df76a836d337ac844255de831d90dc3014969b40d9387d05d2f5aebc19159ff182efd386d756de3401ad49a41931be9ce065b9cfeb31b1d617c359b50545eb4e4b500c2968d85920bf0187d09ba76a9d3a3045755588f8ad3d279b"}], 0x3b0}, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f00000002c0)=0x3, 0x4) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000280)) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40002, 0x0) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000100)=""/142) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x14a, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400441, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000100)=""/138, &(0x7f0000000040)=0x8a) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x200000000) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x0, 0x29, &(0x7f00000001c0)="4e53b8caab53ff087ef9782dc1649d8272b4a499b5f43a0704db89ae2abfb609d0c097c717e7b4c7b9"}) bind(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x0, 0x2, 0x2, 0x3, {0xa, 0x4e22, 0x1, @mcast1, 0xfffffffffffffffb}}}, 0x80) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioprio_get$uid(0x20003, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xe4, "77ac3966e998c39cf47d65171072c8b92a6bc6b25b4139fde4df9d48d9642714f13f7a89aab219efcb341ff10d135321977ab63259bfd721b2d448b498721e930cdf39a2e61d34bc82d10d7400e5079d8ea9be7ec03d6e67ab831fa21a58b77f5e0bc715c1a03c6cb80f2ce66a7408020cb8992fd4bd89817984f9e9c8544cd12bc3dd29b573d70152532428b7d3a8f8358ed087a1cca00ca8a5ae786f833435d4ff26ccce0d5eb558b47b3806ee0a77b418fea0ffe9c87b1f5ae76c3cd447ebf9caf56dea4e0937bd7c4f96f1feffc8c4a2030b84150bcb132079111a94f15e6cb58b4c"}, &(0x7f0000000180)=0xec) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000001c0)={r4, 0x4, 0x9, [0x8000, 0x45, 0x4, 0x6, 0xff, 0x3ff, 0x1, 0xff2, 0x59]}, &(0x7f0000000380)=0x1a) syncfs(r0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r5 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x100) sendto$ax25(r5, &(0x7f0000000100)="08fc7ebef9591dadc1", 0x9, 0x4048011, 0x0, 0x0) 07:58:12 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x60) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffdf2) syncfs(r0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xf81eef1314f875da}], 0x1, 0x0, 0x15c}, 0x100000000}], 0x1, 0xfffffffffffffffc, 0x0) 07:58:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x8933, 0x0) 07:58:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x929, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:13 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x3000004, 0x2010, r1, 0x10000000) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000300)) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@rand_addr="1072981d7cd875a2589a792e37546b86", @in=@dev={0xac, 0x14, 0x14, 0x28}, 0x4e21, 0x79, 0x4e21, 0xfffffffffffffff9, 0xa, 0xa0, 0x80, 0x3b, r3, r4}, {0x100000000, 0x1, 0x101, 0x4, 0x6, 0x4, 0x100000001, 0x2}, {0x800, 0x8, 0x81, 0x1}, 0x9, 0x6e6bbf, 0x1, 0x0, 0x3, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3503, 0x1, 0x3, 0x3, 0xfff, 0x1}}, 0xe8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:13 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18}, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x24b, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0xfa, 0x0, 0x0) 07:58:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6744669800000000010002004000000000adfce44031836a0b04740000000b1b69fa79f5e5910c5fbb874a03c4eebe661ebf66d2663d3b11fd2f7c3e3e483f98a23929bebb8e2978dd185eedb3662d0a3a2b19bfc70000000000"], 0x5a) r2 = accept$alg(r0, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000180)=""/81) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae01, 0x0) 07:58:13 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000380)='./file0\x00', 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8780, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0x3, 0x1, 0x2, 0x0, 0x1}) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x80000, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) fsetxattr(r2, &(0x7f0000000100)=@known='trusted.overlay.redirect\x00', &(0x7f0000000140)='bpf\x00', 0x4, 0x3) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x8000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xfffffffffffffdde, 0x100006) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x53a, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x8000) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:13 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r3, &(0x7f0000000040), 0xa3) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x3, 0x10080) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f00000001c0)={r5}) 07:58:13 executing program 0: r0 = open(&(0x7f0000001280)='./file0\x00', 0x4000, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000012c0)=0x1) r1 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/233, 0xe9}], 0x1, &(0x7f00000004c0)=""/201, 0xc9}, 0x5}, {{&(0x7f00000005c0)=@nfc, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/74, 0x4a}, {&(0x7f00000006c0)=""/80, 0x50}, {&(0x7f0000000740)=""/58, 0x3a}, {&(0x7f0000000780)=""/16, 0x10}], 0x4, &(0x7f0000000840)=""/222, 0xde}, 0x2}, {{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000ac0)=""/218, 0xda}, {&(0x7f0000000940)=""/11, 0xb}, {&(0x7f0000000bc0)=""/72, 0x48}, {&(0x7f0000000c40)=""/174, 0xae}, {&(0x7f0000000d00)=""/195, 0xc3}, {&(0x7f0000000e00)=""/116, 0x74}, {&(0x7f0000000e80)=""/182, 0xb6}, {&(0x7f0000000f40)=""/99, 0x63}, {&(0x7f0000000fc0)=""/229, 0xe5}], 0x9, &(0x7f0000001180)=""/239, 0xef}, 0xfff}], 0x3, 0x40, &(0x7f00000009c0)) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x1, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f00000002c0)=r3, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r1, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x0, 0x488, &(0x7f0000000300)={{0x3b, @multicast1, 0x4e23, 0x1, 'ovf\x00', 0x9, 0xbf, 0x18}, {@remote, 0x4e22, 0x2000, 0xd216, 0x1, 0x4}}, 0x44) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$BLKRESETZONE(r6, 0x40101283, &(0x7f0000000100)={0x2, 0x5}) ioctl(r5, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") connect$ax25(r6, &(0x7f0000000140)={{0x3, @null, 0x4}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) bind$alg(r1, &(0x7f0000001340)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae41, 0x0) 07:58:13 executing program 2: r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x100) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000140)={0xb5, 0x1, 0x101, 0x8, 0x5}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) [ 521.074844][T28079] IPVS: set_ctl: invalid protocol: 59 224.0.0.1:20003 [ 521.182545][T28079] IPVS: set_ctl: invalid protocol: 59 224.0.0.1:20003 07:58:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000200)=0x0) fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r5, r6) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:14 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000280)) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) 07:58:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x5e880) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x80, r4, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4fbf}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5d}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x9d}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0xffffffffffffffff) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x8000, 0x80) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/42) 07:58:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x400454ca, 0x0) 07:58:14 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f00000001c0)={r4, 0x3}) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x3) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000700)="c8db912467146afa240dd9dd1f84d37874c86b1258bb97b7edb283310b37c14b764d8b1c0137c5ef5c313e8ec70aee566ccf5eb61a8b0823a11b9c5c78e6225e215ae726d7ab99742d2e5975fff5034c91d2cac7434197077feff92495fa531e5d74b6df05ac0cc2163910a253576553bda1a582b209d31c5c476edc3a9a1b92e8bbb2a8c57e3489e15fc22a260d48ef96c7ca369a0ae61fbec91d56bd3c67c5572b581adabedab4edd0ff6b00c0a4eb64812ab1a337a29824740009426293b974b977cff6b196c10aa0fe4e3bc0d545f5197064df2e499c39dbf0f12b9a48f29fcbac0ebac9", 0xe6) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000100)="eb718f59976e665d03cba729c6ebb501be9253ff860747d05ef65fce742ef2fc8e872a64844f927d03805c02a77b90b861c88716b2f7aacef7c3d1af7ccc9a8ec053ec92fa2b2065d7a5844890533b2ec23193009a45695494b913b67a0171baf0706f272be5f1a94043328ae95243fc68fdb2be13cf5abe8f7e78a82bbfcfe2c0a5de39120b3a1518d8f8492bbb180f5cd24cea489cd511264b0c", 0x9b}, {&(0x7f0000000280)="10410aad1b7dc81a895136965c27d7ea0d8743451d4d37bcb58bf157352a3b6a411eb8c6d2b4dab7fa4c99c8f3b8e543e3af4edc4c7332c515acea77955875b990484faab1454ae7a310b5ba91f7e4e1cdc549deaa800002d621511e48c8774ae16176f480ca611662a6527da8e4131fb239e2402d1da80856cede1ec01a6a3f5e63b5e50b23bd4d79434b8154e45e2e6520feb32a84254286eb14409b2e3a80", 0xa0}, {&(0x7f0000000340)="4edb657975f2a5adf581d20f71e8c551b3cbe8a9306fed904cd86cb8a623b8957e69f468cfdd3e9cd548b6b7f9405151b798738f40394ec9d6da19c8d045ebee78e250", 0x43}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f00000003c0)="6c6b89c944c537487711725416fc9b5fc494472add2f044d8088c93e9d90f938759be47653801f43077fcc4862fcc182ed3d52ba358b912214f9a9995df4000e667d728574b74f52af215998538c63030f6e5f6e16c35cff4a76041344dac7c4539cad465f", 0x65}, {&(0x7f0000000440)="941c3f663462329516ec556d961b58bfae4495a2045524c140f16282dcb6a2bd8aff5c9b02c5deeaf6cc97c95c1542f55ac0e3a58111b0f9953e10b94e4cbc6953be1d68ccf9abf2f4fc12433fce1b87c14aeca35a456fb9bb40bee73f2e4f392c8cb965c89df3375a184330ffc5deda3ff99d5c15b2236774cb72ac85bf50d8736f8e24dcd0a101e9c42a9d2f76a12c87952fb7391c65cb165912d3ba888a3918e1d694015bfbcc18694ca49154975021", 0xb1}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000000500)="95e2aac9eeb21ca450b4fe2400ee15aba7efbd9833ef0fffa9d43bb41be6175307002d716496696de7c8bf2374ac0f067fa88e432f9f00b75c1b060a1afe1608a59376fd58ee0b123cca4a5bce65fef1e47ebeefcc6a39e3d361c55ed1a7288d1a56b4ce5708d190bdcdb5d89aaf800c98eba3804e60419f607c4586b0d84bd9764bddca39aa1dbe32626f9442a98123769feda0753482ce6b351db40490e5c3d8e752bf2f17535bf821", 0xaa}, {&(0x7f00000005c0)="153c868a3a54e5dcb0d112bc4c8ee172bf848399ec55ec667005e2e2ec03c671eceed3a1d637bea02d16db7c25f6b1441752ce08c8d3521b2aa927ec4684b32c3520d7fe4293d0e3d5140d", 0x4b}], 0x9, &(0x7f0000000ac0)=[@iv={0x60, 0x117, 0x2, 0x46, "0edc378d4a1085e1ea703a152d57c123f46f7fc8d5ab95fc527e9684cc8ad7797ebb1340e6adf9975e6fcd582069fa5775c9087c4c0ef1bb76d6ad073489deae9e98830de1f0"}, @assoc={0x18, 0x117, 0x4, 0x1ef}, @op={0x18}, @iv={0x28, 0x117, 0x2, 0x14, "666585cf6adb84b043d379bac2b8e235bac39690"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x55, "1373ce3ede42fba6e648ad174d1937a4bb12ba12840e42621b1de70efe93a72a2f76f3f223991015c0a348740b0ca3edfad4193721033cbb6e156769e89c039c11cc54b6600ce677776330ef40e2a45a7b7e57a4bf"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x108, 0x117, 0x2, 0xee, "1793c77e444bda2379d8134c055edce10be19bddc12601bcbb090cf89eb838b8cacdd157b321d1e2ec84081ded01799e0ed1e951215f1f4851a9a3ec38b6beaf5f0a42c0a7aab29389881eb217661a9703caf1320a358a5799e38b78da405c0b5d8d30e3000b480a2b433312aed50d358e7c87ee7ff2f5117bec161985e3238e428328bed359d5ad443b6b4d015297ff6a34266a3e12de413b0218822a1f1edaa9b032e82462b1767a68aad2953a980bbf205a2ca91a74fbaf42d86513ce106c3bc2c546ab3bbb4856b3ad431a7739ee191892be32d50969f07c881b27fc6d93cfda71a2dedf52d826ee6e759f42"}], 0x260, 0x40000}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:14 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:14 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x802, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, {0x2, 0x4e21, @multicast1}, 0x4, 0x0, 0x0, 0x0, 0x800000000000, &(0x7f0000000140)='bcsh0\x00', 0xfffffffffffffffb, 0x4, 0x8}) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x40002) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000040)={0x0, 0x0, {0x9, 0x7, 0x5}}) 07:58:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) pipe(&(0x7f0000000100)) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000040)={0xc, 0xfffffffffffffab2, 0x5, 0x4, 0x8000}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0xfffffffffffffffd, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:15 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x40049409, 0x0) 07:58:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x32d00, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r1}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) dup2(r0, r0) vmsplice(r0, &(0x7f0000000180), 0x0, 0x2) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66696c6530206d643573756d6e6f7732766367726f757047504c757365722a12776c616e31235e202f647f762f636163686566696c6573000a"], 0x3e) r2 = accept$alg(r0, 0x0, 0x0) inotify_init1(0x800) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x7) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000002c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}, 0x2}}, {&(0x7f0000000180)=""/120, 0x78}, &(0x7f0000000280), 0x8}, 0xa0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000200), 0x80800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={r1, @empty, @loopback}, 0xc) r2 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0xd22, 0x12000) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000440)={0xffffffffffffffff, 0x7}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000140)=0x7) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r3, &(0x7f00000001c0)='bpf\x00', 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) clock_getres(0x7, &(0x7f0000000000)) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000008480)={@remote, @broadcast, 0x0}, &(0x7f00000084c0)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000008500)={@broadcast, @remote, r3}, 0xc) sysfs$3(0x3) semget$private(0x0, 0x4, 0x30) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x103000, 0x0) ioctl$KVM_SET_TSS_ADDR(r5, 0xae47, 0xd000) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="5caf1ed11e2d20823a7e05589c353c9325adfaebc207af9f90e62908d306f0ecf96a44d5e888b242a8bc67e8d652f47e3d3de5836bea1f00f1", @ANYRES16=r6, @ANYBLOB="040328bd7000fbdbdf25020000000800060006000000040004000800060008000000080006002d000000"], 0x30}, 0x1, 0x0, 0x0, 0x4040001}, 0x0) 07:58:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4004ae8b, 0x0) 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000100)=0x78) 07:58:15 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:15 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000004c0)={0x0, {r3, r4+10000000}, 0x100000001, 0x100}) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000200)=@l2={0x1f, 0x6, {0x7, 0x3ff, 0x3, 0x1, 0x7fff, 0x9}, 0x101, 0x101}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="758801190d40b879f66990e8f39d3986d16211609294ca6cae68b8f8170d0e8abfbd3b5c9466890f1da4da6e8a7a436ddeaeb12bb8ad4c507f3af5510a5a570ba7cb257fa35ec42acb419e9f1097418fce7cc3bf3116e5e1f1e6acb44ef76f23a25f163566e8bf13d8ae5d8cbac24e51f702f519fa0b4c443cd1f8cde33b8ef5eba255fec6d28d086dd2a9f9096cd07e0efce14dc08b31e5dd9a8416be89bb258bbc", 0xa2}, {&(0x7f00000003c0)="727c535b97426b147e22fdb038b1628c197eb524ccee66c37288c2f42c013ad7a8d98881aa1ffd21943c49ea1640e8f8a935a53bd9ab04afd80d1cfb067ffbee412e5e497cd54f10551a0985fb500923f76cf0ce7ad98c0817bb", 0x5a}], 0x2}, 0x50) close(r2) socket$kcm(0x2, 0x3, 0x2) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r9, 0x40086409, &(0x7f0000000540)={r8}) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) 07:58:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001740)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000001780)={{0x80000000, 0x3}, {0x8, 0x8cc9}, 0x6, 0x1, 0xa2}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x100, 0x400) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001a00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x4c0, 0x1e0, 0x4c0, 0x340, 0x340, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f00000001c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0xb}}}, {{@ip={@loopback, @multicast2, 0xffffff00, 0xffffffff, 'veth0_to_hsr\x00', 'lo\x00', {}, {0xff}, 0x7e, 0x1, 0x8}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x9, [0xe6b, 0x80000001, 0x10001, 0x3, 0x6, 0x3], 0x800, 0x9}, {0x3, [0x400, 0x7f, 0x80000000, 0x6, 0x5, 0xffff], 0x5, 0x401}}}}, {{@ip={@multicast1, @multicast2, 0xff, 0xff000000, 'veth1\x00', 'veth0_to_team\x00', {}, {0xff}, 0x0, 0x3, 0x2c}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'ipddp0\x00', 'vcan0\x00', 0x21, 0x3, 0xa8, 0x0, 0x1, 0x8, 0x3, 0xfffffffffffff800}}, @common=@unspec=@connbytes={0x38, 'connbytes\x00', 0x0, {0x3, 0x9, 0x1, 0x2}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x3}}}, {{@uncond, 0x0, 0x150, 0x180, 0x0, {}, [@common=@unspec=@physdev={0x98, 'physdev\x00', 0x0, {'caif0\x00', {0xff}, 'bond_slave_0\x00', {0xff}, 0x4, 0x8}}, @common=@socket0={0x20, 'socket\x00'}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x3, 0x3, @multicast1, 0x4e23}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffff00, 0xffffffff, 'gre0\x00', 'bridge_slave_1\x00', {0xff}, {0xff}, 0x21, 0x3, 0x5b}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xffff, [0x5, 0x0, 0xd13, 0x7, 0x6b41, 0xffffffff], 0x200, 0x6}}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x10000, 0x8, @ipv6=@mcast2, 0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000001700)={0x6, 0x4}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001580)={'#! ', './file0/file0', [], 0xa, "53673b40f9f0bdcb8fe19f463a5510543ebc151c5a10f1e4d567aaf4eea95d4486e68cc48025c7714d71a43e1f26171bf40943589190b219cea531a3084a0e5f1bc30fbd032cffe90b91381bd5e4c1ff341323e5d3cb3bec73967707492f26538b40efcf67db660f66c537f8430d0b39b6bba821f001ead4fde0af3ff3e9e42124c4f1c687f764cccc186501b55b93811e229da6551e0ed08c9a6d4d6c5fd038152ec59bbbf3484072cbec8e439f"}, 0xbf) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000480)='\x00', &(0x7f0000001500)='trusted.overlay.nlink\x00', &(0x7f0000001540)={'U-', 0x10000}, 0x28, 0x3) unlinkat(r2, &(0x7f0000000240)='./file0/file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000500)=""/4096) mount(&(0x7f0000001640)=ANY=[@ANYBLOB="2f646540d59f71da403fea61d34f55f236f936f45fc1e52dafb1382940d4deb5831a2f0528ddc0ab5d14dc2d9d4dca21106bdc7526ab246bed0f5ca577095899056d1efa5244fce0971e60711789b9f9a66badcd28f726de9c03eb6eec2346a01d653c1bb66328fde80ed321eba14bfee3a45e69063b7924c0c127792def6412279932e48a9347366ba79c326dfa1745decd490d02277f0a6ef8b153485b908672235552076d1aab75264c08c0046526f07981d172"], &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000340)='ufs\x00', 0x90000, &(0x7f0000000380)='\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x400, 0x34000) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000300)=0x1) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000340)=""/78) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6f, 0x2000) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r5, 0x328, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000005) 07:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x800) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000040)={0x5f}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r2 = shmget(0x1, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000100)=""/206) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4004ae99, 0x0) 07:58:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x100000001, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x10, 0x0, 0x4}, 0x10) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x80c1, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000140)=""/1) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = dup2(r0, r2) ioctl$PPPIOCCONNECT(r4, 0x4004743a, &(0x7f0000000000)=0x3) 07:58:16 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1202000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = geteuid() getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) mount$9p_virtio(&(0x7f0000000000)='posix_acl_access\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4a028, &(0x7f0000000840)={'trans=virtio,', {[{@dfltgid={'dfltgid'}}], [{@uid_gt={'uid>', r1}}, {@uid_lt={'uid<', r2}}, {@subj_type={'subj_type', 0x3d, 'skcipher\x00'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r4}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r5 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r5, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r5, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0xbd73, 0x181000) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e21, @rand_addr=0x4}}, 0x0, 0x2, 0x0, "ab87f1de7ee011a8fa4ef7522054d8ed1c8f42abf8bb2fb031af32b1f145ff7dcc8befc712ca016907d5febb42722233a05616a1b12a265ad18fa35892a7d524b526957896ad94efb6af84f338309ff3"}, 0xd8) 07:58:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4020940d, 0x0) 07:58:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x6c1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x10001, 0x6ac3}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000140)={0x9, r5}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x420400, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x102, 0x1) 07:58:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000200)={{0x20}, {0x80000000, 0x5e64}, 0xff, 0x2, 0x6}) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:16 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x0, 0x1, 0xffff, 0x2, 0xb6f}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x8000000000}, 0x24c}}, 0x4) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4020ae46, 0x0) 07:58:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="c0dca5055e27cfec7b3bb8e0702df766db2a762aaf3aea01669e246c3c5e6e890539099c40") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={{0x77359400}, {r1, r2/1000+30000}}) 07:58:16 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sync_file_range(r2, 0x100, 0xc5c, 0x1) 07:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) getresuid(&(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140)) quotactl(0x4b, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000180)="cffa46bd6308c77dd4ff11a7cbd4b3ea1889") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x1, 0x80000) accept$netrom(r2, &(0x7f0000000280)={{0x3, @bcast}, [@default, @default, @remote, @netrom, @null, @remote, @remote, @netrom]}, &(0x7f0000000300)=0x48) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000003c0)={0x15059a05, 0x5, 0x800, 0x1000, 0x4, 0x9}) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000340)) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000400)) 07:58:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x61ef6a4282cb4150, &(0x7f0000000140)={&(0x7f0000000080)={0x1c}, 0x1c}, 0x1, 0x0, 0x0, 0xc004}, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x4000, 0x1}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x2}], 0x1, 0x0, 0x0) 07:58:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4048ae9b, 0x0) 07:58:17 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$alg(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x0, 0x117, 0x4, 0x6}], 0xffffffffffffff7e, 0x3}, 0x40000000) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = fcntl$dupfd(r1, 0x406, r0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0xffffffffffffff20}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0xffff, 0x0, 0x3, 0x8}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000100)={0x3, r2, 0x10001, 0x2}) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4090ae82, 0x0) 07:58:17 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000100)=0x1) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x4af) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20500, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000100)={0xffffffffffffff40, 0x5, 0x6, 0x2, 0x7, 0x3}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:17 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x4138ae84, 0x0) 07:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x80) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000c658ea1285dea8914bce3a4fac2f3132250a5b12f89e9d0f6035baaf150a731d77e45ac7b434f55c62a0ef8d9dea1b908b372c11e543c126ef275707239215d6bdf9e91e3196cbaa91dd7f8262d28cf26b", @ANYRES16=r3, @ANYBLOB="000629bd7000fddbdf25040000000800050003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x10) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) munlockall() ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7d55, 0x100) connect$llc(r3, &(0x7f0000000100)={0x1a, 0x1, 0x30, 0x1, 0x101, 0xfffffffffffffff8, @local}, 0x10) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:18 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r0, 0xf}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000100)={0x8, 0x200, 0x1c000, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'veth1\x00'}) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x82, 0x600400) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x40800, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000280)={0x3, r1}) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f00000001c0)={'netdevsim0\x00', {0x2, 0x4e22, @local}}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r2, 0x2}}, 0x18) 07:58:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}]}}], 0x1, 0x0, 0x0) 07:58:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x41a0ae8d, 0x0) 07:58:18 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x141) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x30, r2, 0x738, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x2, 0x1, 0x100000001}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x8000) r3 = accept$alg(r0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000340)={r1, r0, 0x9}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:18 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x800454d2, 0x0) 07:58:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x20400) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000280)={{0x10000, 0x5000, 0xe, 0x9, 0x580fc90c, 0x0, 0x7, 0x800, 0x4, 0x2, 0x8, 0x6}, {0x1000, 0x102000, 0xf, 0x4, 0xffffffffffffffc1, 0x8001, 0x38, 0x0, 0x7, 0x7, 0x7, 0xca7}, {0x6000, 0x10000, 0x10, 0x100000001, 0xffffffff, 0xb1, 0x7, 0x8, 0x1, 0x2, 0x80}, {0x0, 0x2, 0x8, 0x2, 0xeb5, 0x26c, 0x1f, 0x3, 0x6, 0x6, 0x9, 0x8001}, {0xd000, 0x0, 0x7, 0x0, 0x511130dc, 0x6, 0x0, 0x3, 0x8000, 0x1, 0x7e34af6f, 0x1}, {0x6000, 0x4, 0x0, 0xfffffffffffffffc, 0x6a60, 0x3, 0x7fff, 0x8, 0xffffffffffffffff, 0xab, 0x2, 0xfffffffffffffffb}, {0x2, 0x105004, 0x8, 0xff, 0x424, 0x0, 0x4, 0xffffffff, 0x100, 0x7fffffff, 0x40, 0x3}, {0x1000, 0x0, 0x10, 0x9, 0x81, 0xcb1, 0x8, 0x4, 0x5, 0x7, 0x6, 0x4}, {0xf000, 0x3000}, {0x0, 0x3}, 0x0, 0x0, 0x0, 0x440020, 0xd, 0x500, 0xf000, [0x6, 0x5, 0x401, 0x200]}) 07:58:19 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000240)=0x9) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f00000001c0)=""/95, 0x5f) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x588c, 0x0) 07:58:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) accept(r0, 0xfffffffffffffffd, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x3, 0xfffffffffffffff9, "e2087f854f97c78c9315bd39b75c96542fe1a65362433092c7aa6e2038c80708a0d8dfa1b942056817c1e6bbd8410b7fbad857cc019248f38bad4a9b03b3540241dfdeaaab402534828016c1953648df0277d701e040e9e1094af2ec943bed882f110a4568e4131fd3384bba0fbdfb686635ab5f2719900b66b19038fbe8015f6d52b75b5e9dacc17655cc97907dce6d6d4177e9b5653f30bbff09fd4a5d991da6411c2802babead32a12b488889fb26b7ac36ea83ad6c37e837636126ecc1d90ce2ddeaa649faf418b8747b4c502b8908536952814f4d13ee1ea89e52f3fcd5a865c6ba395767e57ad90e95f8b77bf345454bbd6a71d011e4450599d637d84d", 0x30, 0x81, 0x0, 0x9, 0x0, 0x0, 0x1ff, 0x1}, r2}}, 0x120) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x8004ae98, 0x0) 07:58:19 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000100)=0x40) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000180)="f31e57f059323828f782743b11a3f3869e845e") ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f00000001c0)) ioctl$UI_DEV_CREATE(r3, 0x5501) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}, 0x9}], 0x1, 0x0, 0x0) 07:58:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000340)=@known='system.sockprotoname\x00', &(0x7f0000000380)='+\x00', 0x2, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x442000) sendto$unix(r0, &(0x7f00000001c0)="9e82a9c7c00cfc7ff142059250bcbb293fe75f0096bd68393511b4d019778481e5c15f42ea705788955a28d4f444ed3aafc38508d89078ccb4f232ea3243bc0de093eb14c9ec63c9e74eb28a46df0ce4fd41831f971aced08cdc", 0x5a, 0x4000, &(0x7f0000000240)=@file={0x1, './file0/file0\x00'}, 0x6e) 07:58:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) fspick(r1, &(0x7f0000000100)='./file0\x00', 0x1) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x272) r2 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:19 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002740)={0x0, 0x7fffffff, 0x1, 0x8}, &(0x7f0000002780)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000027c0)={r1, 0x3f, 0xb87e588ef6401a8f, 0x80, 0x81}, &(0x7f0000002800)=0x18) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r2, &(0x7f00000025c0)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/87, 0x57}, {&(0x7f0000000180)=""/112, 0x70}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f0000000340)=""/243, 0xf3}], 0x4, &(0x7f0000000480)=""/197, 0xfffffffc}, 0x5}, {{&(0x7f0000000580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/8, 0x8}, {&(0x7f00000006c0)=""/248, 0xf8}, {&(0x7f0000002a00)=""/35, 0x23}, {&(0x7f0000000840)=""/93, 0x5d}], 0x5}, 0x7}, {{&(0x7f0000000ac0)=@sco, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b40)=""/235, 0xeb}, {&(0x7f0000000940)=""/35, 0x23}, {&(0x7f0000000c40)=""/171, 0xab}, {&(0x7f0000000d00)=""/222, 0xde}, {&(0x7f00000009c0)=""/55, 0x37}, {&(0x7f0000001440)=""/4096, 0x1000}], 0x6, &(0x7f0000000e80)=""/192, 0xc0}, 0xfff}, {{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000f40), 0xa5}, {&(0x7f0000000f80)=""/93, 0x5d}, {&(0x7f0000001000)=""/191, 0xbf}], 0x3, &(0x7f0000001100)=""/218, 0xda}}, {{&(0x7f0000001200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001280)=""/30, 0x1e}, {&(0x7f0000001340)=""/94, 0x5e}, {&(0x7f0000002440)=""/118, 0x76}, {&(0x7f00000024c0)=""/155, 0x9b}], 0x4, &(0x7f0000002580)=""/28, 0x1c}, 0x1ff}], 0x5, 0x100, &(0x7f0000002700)={0x77359400}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xd) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x421}, 0xfffffffffffffdbf}}, 0x0) r5 = gettid() r6 = fcntl$getown(r0, 0x9) sendmsg$nl_netfilter(r0, &(0x7f00000029c0)={&(0x7f0000002880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002980)={&(0x7f00000028c0)={0xa4, 0x1, 0xf, 0x100, 0x70bd26, 0x25dfdbff, {0xa, 0x0, 0xa}, [@nested={0xc, 0xf, [@typed={0x8, 0x4f, @pid=r5}]}, @generic="228f8bce7fbdf5f8a3c6f15dc43a013402d4ce95c09417f6d48622bd49e00ec4656283d0f137f6e31c54967fff3cd0d986f466cee4e160d8dc3354fae59dbfd083e455b8e72be421f992767955044749e128093ffa1c543363f5641228f4079506e485eac4d81065f07b01638a4bbd6e6dcc2aa684e4e1727f", @typed={0x8, 0x54, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000002840)={0x28b5, 0x7, 0x6480}) 07:58:19 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x80086301, 0x0) 07:58:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0xfffffffffffffe8e, &(0x7f00000013c0), 0x0, 0x20000007}, 0x80c4) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:20 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sync_file_range(r2, 0x8, 0x0, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000003c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x80000001, 0xc00000000000000, 0x47bf}) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f0000000100)={0x70, "8e45b288e324930d36872cf324189b7f7f1047b3eb7632699ba578f34224d8ae27b1b77f6410999c903bd695a0462fe9a6f4753abe5719b16b76ffbce04ab24edc363cf0c339a96f970baa095484da97620f60db2e32605e375624e52354fcef13e62203179e7a880b119c2e19a51326eef319f9811ea0535a156382358d6c15"}) fcntl$getown(r2, 0x9) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000280)={r2, 0x4, 0x3, "179c8615dc6684fac105e8a69504bac44c751f41b8007349cf0b6e2931c48989092bd520631d11b30521761c5f99bfd8aaa1b6fb5a2ef1079bc7e2f50e666796825ca4921e43613340692f3ffc818a1a5e8cec1b80a39872d31743a152e44934cefc154f6f86f5c842531533a821eb7d460e994271414084dcbcc3893a4ec435f1289b0cfdc183006090f116a602cf0f105a258fe85a29870c6063099d6173c1101283148a9224a49d2d92e0ee54faf62158bbb2207ced73a4ad2b22dad3597bd9545d73fec27a034942b4"}) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) 07:58:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$ax25(0xffffffffffffff9c, &(0x7f0000000100)={{}, [@netrom, @remote, @default, @default, @default, @remote, @bcast, @netrom]}, &(0x7f00000001c0)=0x48) getpeername(r0, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:20 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0xfffffffffffffdf6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setregid(r3, r4) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) prlimit64(r2, 0xf, &(0x7f0000000100)={0x20, 0x101}, &(0x7f0000000140)) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x80, 0x420200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x2, {0x9, 0x0, "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", 0x47, 0x5, 0x536c83, 0xffffffffffffff7f, 0x1, 0x4, 0x7fff, 0x1}, r4}}, 0x128) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:20 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x8802) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000140)) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f00000001c0)) 07:58:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x8138ae83, 0x0) 07:58:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='rdma.current\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x6ab5}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000003c0)={r2}) write$FUSE_POLL(r1, &(0x7f0000000400)={0x18, 0x0, 0x8, {0xfc39}}, 0x18) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200809}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="e0000000", @ANYRES16=r3, @ANYBLOB="000226bd7000ffdbdf2511000000080005000700000008000500010400006000020014000100ac141424000000000000000000000000080004000c0a00000800070000000000080002003b517489080003000500000008000b000a00000008000d00000000000800080081ffffff070008000400000008000b000a0000000c00030008000300030000005000020008000d000100000008000d000100000008000b000a0000000800050006000000080003000300000008000e004e22000014000100fe8800000000000000000000000001010800060004000000"], 0xe0}, 0x1, 0x0, 0x0, 0x4801}, 0x20000010) r4 = accept$alg(r0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000380)="c0dca5055e0bcfec7be070") sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r6}, 0x1c}}, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x34, 0x12, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:21 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) 07:58:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) 07:58:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:21 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0xfffffffffffffe41) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffeae) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:21 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) io_setup(0xec, &(0x7f0000000000)=0x0) io_destroy(r1) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x8, 0x101000) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000180)=r5) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0xfffffffffffffdf1, &(0x7f00000001c0), 0x24b}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x13) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000280)="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") 07:58:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) 07:58:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x8, 0x3, 0x1}}, 0x14) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:21 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='Memory.\xdbeents\x00\xca\x1b7l\xe9\x12\x96q\xbd\x1c\xd0\x85\x82`T\xf0\xa8\xd79\x8b\xb39q\xd14\x80\x15g+\x17\xdaVs\x96\xb7\x98V(\xe3\x04z#\xaf\xeb8\xc5,$m\x85\xa9,\xbc\xb7\xfe\x9e\x89\x06\x7fn\xd4\bR,\xe7Jbc/A6\xe9o\\\bU+\xbb\x93os\vi\x00'/113, 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x40000000085, &(0x7f0000000040)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123d319bd070") ftruncate(r5, 0x2081fc) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x12, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$RTC_WIE_ON(r0, 0x700f) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x80, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x200000, 0x0) write$FUSE_STATFS(r0, &(0x7f00000001c0)={0x60, 0xfffffffffffffffe, 0x8, {{0x3, 0x7, 0xfff, 0x3b8c0fe5, 0x9, 0x4, 0x20, 0x100}}}, 0x60) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) getpgrp(r3) 07:58:21 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) 07:58:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xe723, 0x2400) write$P9_RWALK(r2, &(0x7f0000000100)={0x9, 0x6f, 0x1}, 0x9) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x40001) 07:58:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') r3 = socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x0, "72e5054abd06c5a8"}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) 07:58:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:22 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@op={0x0, 0x117, 0x3, 0x1}, @iv={0x0, 0x117, 0x2, 0x0, "fdaffbab749801f92fc4eca0816d0dae4192de99553138c212a721b3290d8bbe15a0bb982fbd2654fe9730d5b1e06b9c1a291fad65e199144b1c9a0995edca1a5e61735ad30f063f9c59eeb5b004dcb756e62f0cd1bd7a6c990a1e04"}, @iv={0x0, 0x117, 0x2, 0x0, "14065d4969c49228ed195d9593efaf904b4b9fb0ee4e56f1590d3d35e11c7a03aa8fa916a9400cec5c6738c0fc83a9f3b4fbdb83540a17121be8cc42e0a092c723715d6eea3dd23dfb0fa0a48652532186f6898380ead07e2f7e2a6ab617657228be6df22f4ac8cb61e1ca64339e5abe8d302bfa502dc34973e1f46bc6556e6a96ffc5e6c0020ba8c42f46603170017ea5036e4a22ecf87b48c1a898b49ad58c99f3cc094b2e20ae5f67d9049f840a5d29a90dfec51a2c39d794ab9f91b7dda58a6ce1de80b13bbf5d63b1b6631af41f729b923ff771f58ce0ff2e526086bcc31e2bc5ae98189d153a91cbdf746eec4911215a7339"}], 0x53100e09a1a80ea4, 0x200000003}, 0x40080) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:22 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000280)={0x40, {{0xa, 0x4e24, 0x8, @mcast2, 0x4}}}, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0, 0x0) open_tree(r3, &(0x7f00000001c0)='./file0\x00', 0x1) 07:58:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xc0189436, 0x0) 07:58:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0x301000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r4, 0x1, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$netlink(0x10, 0x3, 0xb) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x6, 0x8040) recvfrom$llc(r5, &(0x7f0000001440)=""/4096, 0x1000, 0x10040, &(0x7f0000000000)={0x1a, 0xffff, 0x7f, 0x1, 0xfff, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:22 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 07:58:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = dup2(r0, r1) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x80000) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="18caf5a01f1412aa67babda6ef494f65d4373b454163f2ac9753139d2368c06bc1988f8bd594a68797bc0ef00e7c84a8f53cb9e91e607064f1850e7c72c3ba9e1641cc394215fdb240ddd53cbf161acbecb5645a7d28142d6e56c69e694258f52e921b08f0ae1a8dbc8b4bf53971499dcb338af4fe0a3957ab55b0d8d43980326a581d5c00450d06dcd3e617ea4cc95852d521", 0x93) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getrandom(&(0x7f0000000280)=""/139, 0x8b, 0x2) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000018c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000001880)) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000380)='./file0\x00', 0xe2, 0x6, &(0x7f0000001700)=[{&(0x7f00000003c0)="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", 0x1000, 0x6}, {&(0x7f00000013c0)="5484ffb7356db9d3bcb5593f891ab4498273927e6bc30395b9cfa4214e487dcd1bf237974ce77d8bb443b0a6df96d7cf9adb6af077f51c3f27223fdfcba1ba8cec90a475f241d6f532e1d4c2037159742f16a812cd84f7c89e9c674621a451c8f33e7aeaa959661113c2f5fb88aa81a29521660b5c59a153219556d059681c62611f3f176769284352f51ea9758f94de08096981e24073f2ad895d4398188180eae9d5e060a4b44733cac636f5eda30e1bcfe0246303580fada4147d180789fd12317c39905f13c07c7b02bfc776060c3cb62ab4afa52d4dc42256a497ee0e0654805446c2bd5a03a10108d3d9fe392ca83e9e", 0xf3, 0x1a25}, {&(0x7f00000014c0)="e33dac18fb6df7382f660b148f81a8c87c2ebdbab13d9b3b1285ec4f72d76288fa8dc2ad99969fbf967c631658b317d28c70950c9515650e8f2887df2fbbdd4d1c3814bee7ab0fb15b7abce11a9ca7879e126e818a165d46755490005ca05b2bb330fc6c5e726f1cfbb0f94750367dad87df07fac3ac4efc33671a4d6ecf658628fdac087f0f5b9253d34e0037811234d0a116b5fa4af84eabcc9a1bba8ed5afa3edb579e2a3b602a6db0b95c1490f8c064fb09f3f896e3f3f4ccebe77edeccedafc88773a4c8bba493237", 0xcb, 0x800}, {&(0x7f00000015c0)="69a2b07d78d51aacfd661729878813121399773f6c04c67e8d5e6e7f05381ec34a41", 0x22, 0x4c0d}, {&(0x7f0000001600)="be6cb34f54fcab54c5e72b99d9c0dcac9a1cb165f9ecea9c1baa7425e63103579cafba64ce0a41100542a02b4e0394845d9d7ca1c89e33249c064ab015ce3dcb2c5e11c2e7ad86dfe62445c7923f6e739a657c4887cda0baee1ba3a558317e7bf2966d38bf831719310ae940e6ba107435a48feaca", 0x75, 0x1}, {&(0x7f0000001680)="9f7ffb7ba3d23e911093cc87e7abcbf34d653d55c3d817f8f60477d17af68de00223cdc1bd32ba2bed8ccf43dead6fdebe002f24d2035e8caf27aeca447873dce3ed6154f98e2b89e8e3d451530ec4ba00986e70701eee8397a52d0e6ac78dd0a0408e659f881039d1", 0x69, 0x9}], 0x0, &(0x7f00000017c0)={[{@barrier='barrier'}, {@attr2='attr2'}, {@barrier='barrier'}, {@discard='discard'}, {@grpquota='grpquota'}], [{@subj_user={'subj_user', 0x3d, '\x00'}}, {@obj_type={'obj_type', 0x3d, '!'}}, {@context={'context', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, 'memory.events\x00'}}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x7b, 0x0, 0x36, 0x62, 0x7f, 0x38, 0x32, 0x62], 0x2d, [0x33, 0x39, 0x75, 0x77], 0x2d, [0x66, 0x30, 0x30], 0x2d, [0x32, 0x65, 0x66, 0x31], 0x2d, [0x65, 0x77, 0x63, 0x62, 0x77, 0x65, 0x37, 0x76]}}}]}) 07:58:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xc018ae85, 0x0) 07:58:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="24d67b1f834365abebc8b22e2f8e2e60fb62e758e558ce136ee0ec4702cd12e0d06e40d98cfa6b37328b146c018cbf09c1813553", 0x34) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:23 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x10024) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000740)='/dev/full\x00', 0x80400, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000780)={0x0, 0xffff}, &(0x7f00000007c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000840)={r4, 0x60c}, 0x8) ioctl(r2, 0x1000008912, &(0x7f00000008c0)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f00000001c0)=[{&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/147, 0x93}], 0x2, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/254, 0xfe}, {&(0x7f0000000380)=""/185, 0xb9}, {&(0x7f0000000440)=""/75, 0x4b}, {&(0x7f00000004c0)=""/106, 0x6a}, {&(0x7f0000000540)=""/167, 0xa7}, {&(0x7f0000000600)=""/165, 0xa5}, {&(0x7f0000002440)=""/4096, 0x1000}], 0x7, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000ac0)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='\nt J\xf7\x80\xc6=\xafOj\xfe\x0f\xe3\xd4\x100\xb4\x1e\xb2\xab|U\x83[2 \x00\x00\x00\x00\x86\t\x15\xca\xb9\xb8@\b\xc8\xc8+', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x8, 0x44000) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000340)={'#! ', './file0', [{0x20, '[bdev\xd1S@em1'}, {0x20, ',em1cpusettrusted'}, {0x20, '*keyring-posix_acl_access-procwlan1eth1trusted'}, {0x20, ',-}vmnet0posix_acl_access!-'}, {}, {}, {0x20, 'kw(serpent)\x00'}, {0x20, 'skcipher\x00'}, {0x20, 'kw(serpent)\x00'}, {0x20, '@.'}], 0xa, "659a96a40733e5841e7fb050fafa20eaee831ad65b82abcd016c79b033ca6df94c115b5b7eff0c85ba5f4382b8678751737cb1d3a773f75b6ec9841d69c8018ef823d8b371901722f0fc48f7c0592e9efba5e6256db0e60070908dc5437a"}, 0xfb) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) accept(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x74, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xbcc9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xa30c}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xc020660b, 0x0) 07:58:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x81) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:23 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x5, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x800) 07:58:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0/file0/file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x2) 07:58:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)) socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:24 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:24 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x17a, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000085f4164923c6ef25a50d386c2696122500000000170100000400000001000000000000000000000000000000170100000200000000000000695ab5243284e1b66e2f99ba6229f816f5df34b9cd4d884d92a6370d8a3094aedc059bb40f9dfcd417c3032dbb73e1a96a00000000000000000000000873000000000000f78b110903f89544f6835e4d"]}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:24 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-ce\x00'}, 0x58) mq_getsetattr(r0, &(0x7f0000000040)={0x1, 0x0, 0x101, 0x4, 0xfffffffffffffffe, 0x6, 0x7, 0x6}, &(0x7f0000000180)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0xfffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) r3 = accept$alg(r2, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) syncfs(r2) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) acct(&(0x7f0000000200)='./file0\x00') getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0), 0x10) 07:58:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') r1 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) mknod$loop(&(0x7f0000000240)='./file0/file0\x00', 0x500, 0x1) renameat2(r0, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000200)='./file0/file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x3) 07:58:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x4, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) readlinkat(r0, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/124, 0x7c) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000040)={0x2, 0x4, 0xc0c, 0x7}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000100)=0x6) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x58, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20004000}, 0x8000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20010810}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r5, 0x320, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000500)={0x3, &(0x7f0000000200)=""/68, &(0x7f0000000480)=[{0x7fffffff, 0x62, 0xffffffffffffffff, &(0x7f0000000300)=""/98}, {0x4, 0xc8, 0xfffffffffffffffa, &(0x7f0000000380)=""/200}, {0x4, 0x32, 0x5f37, &(0x7f0000000280)=""/50}]}) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:24 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000b00)={0x0, 0x1e, 0x7}, &(0x7f0000000b40)=0x0) timer_getoverrun(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="bb4703107ebc7ded866e3e8630053e8967bd97907229783e30634e9124b4bbdc6fbbc5fc5e84fd6448fdaf22b1f5e21f12444f8fd3addc3de83df55cb24fd8a97f859aa81ed50df6b17e33d2596d16", 0x4f}, {&(0x7f0000000180)="d7578d44ab64c9e3b6bde528841ea184dd93d3092abac40e867ecdd3f703d241e27ab1597b1c782c718726294041f40e47678160444072efb8709851221c701ec7e90a61e88e3769e746c20eaf10", 0x4e}], 0x2, &(0x7f0000001440)=[{0xd0, 0x10f, 0x2, "9d53c5a6113476a331b3529e70d27ede71d5155650e423b0469018342449bbed7bcaf1170ae731dabce2e26f9a2688489d6f15d95bcfbaabbf6ea33e77d11fcd4e182c6ac864699c465d02518dc689fea9d87bd35bf0618432b5d2074ed8a90099bc4cba0df3c92a2ec94447d9d097d7053e2e586cb7d6e1980ec7271cc4ea0c265da7ae7e8275183964a83f7739ed04356568c2d6461ea0b0b09ecac66334cf18a6b71c6671b9400bc976a16ee38879631c6916ebe73c96a0ac5f34"}, {0xb0, 0x109, 0xfffffffffffffff8, "12fea0cd57d01335cf4375a97b159d958a1c0315a0129213bb13d27d37a7dce762e9e8613494581325bd83a6fd278cf782c4c412874e5fc67a7cdbfdb130cc69e098e2bce9d57ef6ba95cd46a6b481d5090b84a117e9b61e8f17dd436293ba51b8ff31af3a0c5ab2b1384758c5a1de56d20dd148f4ec7292bccc3f20cd63e6e8bc03313d3489d3f1167d64620e59efbd7b8f335882e097fbeec048cc"}, {0x40, 0x103, 0x2, "44ee01d4428657a9d7eba1a2a630c97d54e5d5a5ae9b097825597deefbc92eb9b2f9d0ce1b92e949d5"}, {0x1010, 0x100, 0x7, "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"}], 0x11d0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)="7a09c615377f189866c5a5c55a94a54067ef9f1a6fa1cc", 0x17}, {&(0x7f0000000300)="a60f236ce0d010e27ffefedaee6d7f1968444bddb9c67dcb87136aefe70d40662579beef60304c935272604575bbc10a7f644377453cc784e2ea8d75095e69551f2c41fe9e114e", 0x47}, {&(0x7f0000000380)="b03382a950065dfe97af270ca4d9fc01e96a671ef2093ca330f4055ae96911967c2d8241636ed18e9c6ed65db95f3dfa68900daf7f6c2ef2ef1710a461b3f061db1f0fcca54190b716aae8b7b1d239ba652a6ae75e37ba9aa96071bda5476d8903104cfe76e4", 0x66}, {&(0x7f0000000400)="d79e74f31c98d5a185bf3ca3851a993587292de846277c70c7f80e5c4608f9a407deeea60be143ae30c6e46ade47621a5de8f161e70d22bca0e8b36c31b4767fefa8eb1a20c578b4465260bbcf7d11c2580e6f734b3167338ed39a4b24e445ea9833f725a86782adcc1b28d93ef010d4caf90d55819587c0546cf3f8b8bccc3f4517d9754d88ae1489468f48684da8f3f30ac9fef40742ab518a8e6f0be033562fc094f1d9e8a83e43c7bc2f58f4fca017e13f53c7be1b88c7272b2bdd95ec84831ecbfc8682bd73b5d84400d11580d8e8376755", 0xd4}], 0x4, &(0x7f0000000540)=[{0xe8, 0x12b, 0x594, "8729268ec7f3b6026744880a0833af26f29afd4e3ab5ca396e2498571ab210225d72cfafe010cbb1bb89e4773ad8e8db50f076765ca7d8c5d5fe660142d2f36555c6e9f9550fe1ca0b586b998b37d1e4382c0b4ba9f50115bf644a0b026c23e6e331f5918d632c5b96b6ef20d392488e7d1e7d1d34f30df4443c8550207aca4526d27e67839cd4fe553c089841a1ae1bb116d3788f1064ae5a53e77d139088a502d04d0869f4c57733f65c92e23b63c02e2c22ac55ed2ea83c993372b99e0f76e4785224d5161b049f36ffd17670d8e7832d"}, {0x20, 0x197, 0x6, "dbdb280a6fd46892515654"}], 0x108}}, {{&(0x7f0000000680)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000700)=[{&(0x7f0000002640)="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", 0x1000}], 0x1, &(0x7f0000000740)=[{0x78, 0x117, 0x40, "d97fed6714207c7c15b34adaf81ba280bb842ce35f9d3d85a7705de6ed8385dbbfcf10fed4ae5b5c67f8267942e866d506ed356957b3478b13bce9925efbdacfddbf3c584d4d78b6cff7874f17deb28827b1ab2b6195904a939c826a41df5ceeeae9d78f7b"}, {0xc0, 0x104, 0x7, "e8716ad28cfb7b7baee1854c951d377a961940e33fe76703af00a6e8df2374ad0eec5e654c9e420ae038e9cc50db35c32aee54fd69bbaff1dd8bfc696ccf46329fcd5b6f1aa5d16131db4a37c4f57321b30c03d629fd59928341f412e9e4dbd9ac56885619af6b5bee101eea951c3aee9d5e554454383d85184c9210081db12e90453a2876cf40a89dfe174fa2fa425e5deb274f169f1049993c988f2164d8ead3115d6d147794537490a81e7e18cc74"}, {0xa0, 0x0, 0xffff, "fc47c4bc30fb2306f2bddbdb9c2f08afab17c5c2e05a8ab517c7302bd9a2600b9950b948cd93646d380ab83fb56ce81f6e62575e9a5f16c51d75b120e5de4c5df77abac77ad3a48baf0d77e0c3883c1c064196117f33848049fbf34be508c98a81c29e744ee837a12a867eda2bbe22d69408a2a817013e1b1142e15f36317ea2ececae81439f20b9b7011f1e7c"}, {0x48, 0x1, 0x1, "9879df5752b8e47a65390e7856cbdda4a52d1876e981246fa4a61d3b247047ebc51180664c7169af3aeddbff0e8fab5e0d"}, {0x50, 0x10d, 0x8, "a081a8ab62cdae9a4feaf7ae27dbdc6df0fcdf28ee1dbaf7b535fecfcc5caabf2c953a9245b238ceb4b8116da545754a972c31cb779e4e99de"}, {0x28, 0x11, 0x8f47, "15ace8a0dd8b4d0339b2c53ac09853482099d1214f2023"}, {0x48, 0x114, 0x6, "6de35b9f1fd9bb31829c6a485a73001a1a9bf100d44e5d6a85bdbadd683e4d5593739caee1253b20f034427f837e78553a71"}], 0x2e0}}], 0x3, 0x840) ioctl(r4, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) 07:58:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000300)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r3, 0x3b36c75ecd17bdc2, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x240400c0}, 0x4) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x8000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="60010000", @ANYRES16=r5, @ANYBLOB="000628bd7000fddbdf25100000004c0002000800080008000000080007000500000008000d0001000000080003000300000008000700ff070000080002004e22000008000e004e240000080006000004000008000d00000000002000020014000100ff01000000000000000000000000000108000e004e22000008000600ffff000008000400070000005c0001001400030000000000000000000000ffff7f00000108000200a70000000800050004000000080002007f000000080004004e22000008000900760000000c0007000800000008000000080002002100000008000500040000007400010008000200840000000c0006006e6f6e65000000000c0007000200000031000000080004004e20000008000b007369700008000b00736970000800090057000000080009005b00000014000300fe8000000000000000000000000000bb14000300cd739780abe75e559fc52a94efd1b86e2f6ae9bae407b86bd2f3ce99f4935180bd489a246feee93e345756d5b500465d1e661d004d0e7ff1377eb61b40b06615b6381f5def84129cad52ddcc5209a9075ec2428820a19485496d6fdab65e21b01c612b90c3b3dac5152b4efb41378063a7595d914f2995ce8343edc594a36fc1c19de606fc7eaf7f47e5f2"], 0x160}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) 07:58:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000002c0)) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000180)={[{0x2, 0x9, 0x3f, 0x6, 0xb2cd, 0x9, 0x6, 0x2, 0xcb, 0x3, 0x0, 0x9, 0x7}, {0x8, 0xfffffffffffffffb, 0x4, 0x6, 0x3a5d, 0x8, 0x1f, 0x4, 0x8f88, 0x1, 0xc6, 0x6, 0x2}, {0x8, 0x2000, 0x3, 0x200, 0x2, 0xbf, 0x0, 0x7ff, 0x1, 0x5, 0x3, 0x800, 0x5}], 0x4}) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="5600000051a199073db635d2b999b20b4dd2f31d1c90279da56fc7daa51d291db4f5bc58df02261431e56f01dbfa219121b28f91530d51bda91070143e9b3a8fe7ed16b71d5234b6a2444b00"/90], &(0x7f0000000100)=0x5e) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000140)={r5, 0x6}, 0xfffffffffffffdc1) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0xa, 0x4000}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r6, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x81, @link='syz1\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x20004890}, 0x80) 07:58:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x4) 07:58:24 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x800) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @multicast2, 0x1, 0x6, [@rand_addr, @local, @multicast1, @dev={0xac, 0x14, 0x14, 0x14}, @local, @broadcast]}, 0x28) 07:58:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffe1a, &(0x7f0000000100)=[@assoc={0x0, 0x117, 0x4, 0x2}, @op, @iv={0x0, 0x117, 0x2, 0x0, "598fb5a94467fdac169712b76e5f4eea6ade207b17abfbe4e4b089865178d75e8475842f4151a84eafe246d61466d4f80a5f3c5914448a09943ae5f665d818853ab0a9a0ffec482f0bda9e8b282fb69ce1f695c0fdac2f8209dccb38724c702413c7ebc741c93b889896e57347"}, @op, @op]}, 0x4000) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0xd06, 0x800) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f00000002c0)=0x6, &(0x7f0000000300)=0x4) 07:58:25 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x5) 07:58:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="a4e92538735cdcff", 0x8}, {&(0x7f0000000200)="67a9feeb92f06b588552095be6c3cf72636b1fb4f1307924a91ad4d0414d63f05889672c6b8a3792d9764d8fb52724d99613bf174d27fd17918328c7452aa190da7fc6c08552ce99c2aa1ae7e78fede4f3c1cf2d51be404fea0c94b1f4684e832b231dbb62dc4b05de6eb2d2d47f5afa72aabe9e568383ac9c394471b82cd35084b404a84a786b2cfa367a6fa0b24b208c66196082b1873b812baaeea7388ceffed75f1a7929d26b9af1a2f4918ad6a5b4ffe995a83663a5626179", 0xbb}, {&(0x7f0000000300)="04540d3373d4fe6083861cfb627844fa5293224952479972643c55f21ea6d135176e8c3f3acaf0f87e97b2d0543185a57498ac2cd04b88239eb057bbd27271d793a80662829a5ca8f21d55f6924da6498b65bf17d32af2016e4237e54872853bcfe785fdf08020969d770ce1b09ec99d29e7348dfafb2ec285ab8ac4c14fc365bdf13ccd9330fe4f8b92695d496c90a0710c2df615ea087e1494d874364d411a", 0xa0}, {&(0x7f00000003c0)="cfda1a8f39fbb9a6262d5b5378a45f4c59af7efaf35956535e4004e57d9918362ec5c5e5c9b8204e9b534c7aaf4a48a223ee60f61cfc66f7744c57de45f47d8e3ba5ed7a89232c09290a489c7e23a74321d6cdc4f8153e6d99aa6d2fd952a02e16bbf8477f0cd855c0cf8f373e0111f24397985eee04644a94e8d3811acd1d844ec03cd35667d9435b7024a9f95ec81254903231c49060214c63f2fe6e91a268e8fedb5215d4c6010f1222fd7b89d30ac4ab", 0xb2}, {&(0x7f0000000480)="e547d2027655ad2731203200ed87e0c66101e5ef97bf4dbbfdecaf00ec6b00ae2f193dd0a01604446f6fee39857437900b0f7b92d993dcb7f683fd5ad59cd4e875c406c639489a", 0x47}, {&(0x7f0000000500)="b62be1a8da73d799e6e2d01c10118cfacfd284cc4a085da5d47af66ea9b668fce8b4861b08328532cda0eef52c09572f2bf54513ede3e049a3766399771c4025c769e474b2c5b5bf11125b34e7cb29e73f5e68f7acbad80d389ddafeb1ea014fcb61dd38a90ffdf3ad1f6b7fec89d4c44aedb5117ccb2ca812993287bb0a8f85c6f7ece210ca1aff9bc5048885cc3b5a839eaf43ee5b92e804ed49185c36e85d9f716e095c03302b52c441f47dd41445a2517da611b6bb36277a59c2c301d097067d99aa2d94cd0142357aba5000ba5369844886f94503b6f4", 0xd9}, {&(0x7f0000000600)="f46429892ce9cbdc637e46e1e9910125bc78dc1c9cbe840e98d54063ca4d054a6b6f60fde580f43145c705cabb9913e09225711bf18955d4aa49b60e7f2e545558e0f812f8bf53a462e8806a868418c00cd29e9d8ae3afb4de8edd10f78eefb15be9fb93fdbf2543", 0x68}], 0x7, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r1, 0x0, 0x0, 0x1}}, 0x20) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x100, 0x0) getdents(r2, &(0x7f0000000140)=""/107, 0x6b) 07:58:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r1, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="32f756efec48b099350f9d943dbb562617c2d345a8faa0a234d548f8129fc7032b108c19e40c54d095a27aefc54768619812e4a1d0388f1ab47bd228a842597abe38154585b3538c4b55ae8fe87d6969c7d391c31cf51b3a2bb8c004c0ea27d80c0a7603266f4abf26a0fd7aec017fed579340522bfc3643dad8262d53d10ddfd87169533ab002c7dd62e3de1ab04946ba2ebce44918fc1eb4b8ec597694d46d117b742126447658ec1b85511ae2ceb788674e23d32f5772c15a10fc66c33732cb62b275a0241ca87348cc15521b25669308132d511ce5a9a3ad5b64389dd0ac1b7b49c99895ba0224c88a621d463d20b15d474ccfd5892d71ff7b689fc00d943a68a6d72d5cadf74e7130c03eb127b3fb42138983a6762abb47373b9ea9c8016c932aed1d5657a861374f59a075b663dd6cc0afd9f6befc7b5146c748eb48389cbd023749d563a821f6d9685764ddf2197b45a0edda13c146214eb8958e6c9fe25de5de74b75711498566829e9e55356acb4a8b6bdf82b58eff10d45d7f6924adc70d0e3c25419795a5b67be22e4c0f71"], 0x1) fallocate(r1, 0x3, 0x0, 0x8020001) lseek(r1, 0x0, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x2, 0x2) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f00000003c0)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101000, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7e0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4}, 0x1c) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) setsockopt$sock_int(r5, 0x1, 0x2b, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40010}, 0x80) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0x2d, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r6, 0x0, 0x0) getpid() 07:58:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x6) 07:58:25 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="ffff000000000000"], 0x8, 0x2) 07:58:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000380)={{0x5, 0x81, 0x200, 0x3c25, 0x1f, 0x7c54}, 0x20, 0x1, 0x80000000}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$tipc(r2, &(0x7f0000000340)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x1, {{0x41, 0x1}}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000200)="37055231a9b457e3fe0d301173e81ce3cd7a4ac996298b29cc11879b120f36e59680dd2c7e753f320271429dc4fd3170cecf75435c5d4ac5261e8f10f7f60a9000c412c2da9e16f79832f917962a08fcd41e1d3ea22ac11cdd611e461265283e62532d3bddbc1cfca1f4df672e4c8400934d1b45049a9ad7236c9b4172dd6f02c5f4426bc2914e06782a0ed7cc32eec007c346a31bdf10369b0b4b9cfd16eda21155cca813e42b54539101be3a", 0xad}, {&(0x7f0000000100)="057c418cd60f58e744ea9e58a3d022cb69526cf9eed25cfa2cd83d7c10", 0x1d}], 0x2, 0x0, 0x0, 0x800}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='lovboxnet0\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0), 0xd}, 0xfffffffffffffffc) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/171}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000300)={[], 0x5, 0x3, 0x6, 0x0, 0x8001, 0x1000, 0x10000, [], 0x6}) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000004c0)=""/115) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) fstat(r2, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0}, &(0x7f0000000940)=0xc) getresgid(&(0x7f00000009c0), &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000c40)=0xc) fstat(r3, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)=0x0) stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000001000)={{}, {0x1, 0x1}, [{0x2, 0x5, r4}, {0x2, 0x2, r5}, {0x2, 0x7, r6}, {0x2, 0x3, r7}, {0x2, 0x1, r8}], {0x4, 0x5}, [{0x8, 0x1, r9}, {0x8, 0x4, r10}, {0x8, 0x1, r11}, {0x8, 0x0, r12}, {0x8, 0x7, r13}, {0x8, 0x4, r14}, {0x8, 0x3, r15}, {0x8, 0x5, r16}], {0x10, 0x1}, {0x20, 0x4}}, 0x8c, 0x1) 07:58:26 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xde, 0x880) sendto(r0, &(0x7f0000000140)="33032db5d1ad7a32f3b78d2bbf4c4d1261d99588e1b8bdac488e0734d3877f004fc94fc679055a", 0x27, 0x40, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x4, @remote, 'batadv0\x00'}}, 0x80) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xffffe, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000240)={0x9, 0x79755647, 0x2, @discrete={0x555617ea}}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 07:58:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x7) 07:58:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x181000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000008, 0x30, r2, 0x10000000) 07:58:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x80, 0x80000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000300)={{0x3f, 0x78, 0x2, 0x7fffffff, 0x40, 0xf7}, 0x101, 0x8, 0x2}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) read$alg(r2, &(0x7f0000000100)=""/42, 0x2a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$CAPI_GET_ERRCODE(r3, 0x80024321, &(0x7f0000000000)) r4 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000280)=0x4) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x4080, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r5, 0x4) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:26 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xfffffef8) 07:58:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x1, r1}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x400, 0x4) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x8) 07:58:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000000)={0x3, 0x1, 0x200, 0x1, 0x1}) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:26 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x62, 0x200) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x2001004, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000980)) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f00000008c0)='.request_key_auth\x00', &(0x7f0000000900)={'syz', 0x0}, &(0x7f0000000940)='~)em0system--\x00', 0xfffffffffffffffa) keyctl$assume_authority(0x10, r1) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000001c0)) mount$bpf(0x20000000, &(0x7f0000000a00)='./file0\x00', 0x0, 0x410, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0/file0\x00', 0x1, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000280)="986b31ea727604e44d2afb94567fbab796b63bb25db1b5b46928bb", 0x1b, 0xa0}, {&(0x7f0000000340)="d854b43ffb3c676c2d35df04237ced2bc1f45cd8570978c5113dd6a678c6a4768705acd8e03378300b0237785da04e41ec3a4aab8a842dc90bef55c3ae164a4c3b0f52b5fe4440ca3d4da2a4d1e6f9bff0644bf2f98dd5ca40afa5c19ffea2a7bacc1498c7b373b74447a7894c6542b4e8bbe85a9d49f556a02dcf0b6e2d7b1504e42a1d9652ceea981b276c0a01d27dee115edae5c85419f00638103581a4f879db8428230c04d53842e8c1cfae5ee2a010b07ddedae360ccfc1d870848607949fa54f3b728e3d35fb067bb72cc9eaed4b7ed2d24f21a581fd579c1eda0682ed1e4d6", 0xe3, 0xc678}, {&(0x7f0000000440)="ad5182fd5c5a8f9e567d97a4a4d148430e3e310dd60959ab847cc0e50a83", 0x1e, 0x747e}, {&(0x7f0000000500)="893da84f04b1449a1f51171da7a8e2b0cd585a8ae91a6dd5e8417f9fb525f94c1f1c9acfa9c5bd00ff43abdf2bf2b0716716c1bce5df8a4e59e19aa20e0f54affba7751d66e168887dfdf8bbb64e444b202df6dd23e357898e3b8899c1bac8ecd3bc58a4e8bd49fb11535fd44f6892239900095fef3195607f42b9b5d797c8458577c3db74b91c63ac1376f316979110e32124d9bf8f35d16d4840548983b54a", 0xa0, 0x5}, {&(0x7f00000005c0)="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", 0xfe}], 0x2000820, &(0x7f0000000a40)=ANY=[@ANYBLOB='iocharset=cp862,gid=', @ANYRESHEX=r2, @ANYBLOB=',iocharset=iso8859-6,gid=', @ANYRESHEX=r3, @ANYBLOB="2c756d61736b3d30313752373737373737373737373737373737373533342c747970653d50b8bd482c71756965742c61707072616973652c9754d5c33532a37e09cbd33a00"]) 07:58:26 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10040, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x42800, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x1) 07:58:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x9) 07:58:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x660) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:27 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x8000, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000040)=[0x1, 0x2], 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000100)={0x0, 0x80000000, 0xffff, {0x8000, 0x7fffffff}, {0x7}, @cond=[{0x1, 0x3, 0x9, 0x9, 0x80000001, 0xf934}, {0x7425, 0x1ff, 0x40, 0xe27, 0x0, 0xcd}]}) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) renameat(r1, &(0x7f0000000140)='./file0/file1\x00', r0, &(0x7f00000001c0)='./file1\x00') mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:27 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x40000, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x4, 0x30}, 0xc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x80000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0xfffffffffffffffe, 0x5}, 0x10) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000140)={0x6}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000000)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") fchdir(r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x15a}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x3d8, &(0x7f00000000c0)={&(0x7f0000000100)={0x1c}, 0x300}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0xa) 07:58:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x100000000000016a, 0x0, 0xffffffffffffff30}}], 0x1, 0x0, 0x0) 07:58:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:27 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) getpgrp(r0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r2, 0x300, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4) mount$bpf(0x20000000, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x3ab, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5005, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200000, 0x0) sendto$unix(r3, &(0x7f0000000380)="3afd7dc51a84219a5d649701bd9cb5b4d211093df336bd280a85bbbff4c59d6093700d95d6a1a48d4c4a3da63a04d5652fbb4b07f5dd04ae891516889aae87952d563faace5f2c0b41031b07cf56f5217da801e3f0ebe40afe9730e7bcc7f4741cab65e74b2b1ad7974b057b835a0fd0edf5caa803c071306319a82fa2351dded57e3a4cea8de4c5d3519d595500754e13c5dd219f1eb7c2522137216da43fc0fb2343db8a3cd43c5d01e4e4c8040608153405fddb4b03a53260bf36c431a452", 0xc0, 0x4004, &(0x7f0000000200)=@file={0x1, './file0/file0\x00'}, 0x6e) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') r4 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x3, 0x6001) connect$unix(r4, &(0x7f0000000300)=@file={0x192725286fb7f919, './file0\x00'}, 0x6e) 07:58:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0xb) 07:58:27 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20001, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f0000000100)=[{0x80000001, 0x80000001, 0x2, 0x7}, {0x100000001, 0xfffffffffffff4b6, 0x3ae3c2c7, 0xe1}, {0xfff, 0x0, 0x46a, 0x9}, {0xffffffffffffffc0, 0x1ff, 0xff, 0xfffffffffffffff7}, {0xec, 0x6, 0x9, 0x7fff}, {0x2, 0xffffffffffffffff, 0x426, 0x4cc3}, {0x80000001, 0xbf, 0x4, 0x9}, {0x6, 0x3f}, {0x100, 0x8, 0x3ff, 0x6}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x2, @remote, 0x7f}, 0x1c) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000280)={0x2, &(0x7f00000001c0)=[{0x5, 0x7, 0xeb5f, 0x6}, {0x5, 0x10000, 0x3f, 0x6}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x101, 0x8}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000003c0)={r3, 0x3ff, 0x100, 0x7, 0x1ff13cf6, 0x1, 0x4, 0x0, {r4, @in6={{0xa, 0x4e23, 0x280000000, @mcast2, 0x8}}, 0x4, 0x9, 0x9, 0x2, 0xfffffffffffffffd}}, &(0x7f0000000480)=0xb0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x8c) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000280)={r4, 0x2, &(0x7f0000000100)=[0x6, 0x10000], &(0x7f0000000140)=[0x68], 0x7, 0x1, 0x20, &(0x7f0000000180)=[0x200], &(0x7f00000001c0)=[0x7]}) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') r6 = dup2(r0, r2) r7 = syz_open_dev$usb(&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x1, 0xd0) r9 = creat(&(0x7f0000000780)='./file0\x00', 0x2) r10 = accept4(r2, &(0x7f0000000840)=@l2, &(0x7f00000007c0)=0x80, 0x80000) r11 = fcntl$dupfd(r0, 0x406, r1) r12 = syz_open_dev$cec(&(0x7f00000008c0)='/dev/cec#\x00', 0x2, 0x2) r13 = syz_open_dev$swradio(&(0x7f0000000900)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000009c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000ac0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01002abd7000fcdbdf25050000000c00040005000000000000000c000800ff0f0000000000000c00020003000000000000004400070008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="0c0002000000120000000000"], 0x88}, 0x1, 0x0, 0x0, 0x8040}, 0x80) 07:58:28 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0xc) 07:58:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x8180) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0x4, 0x8) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000180)=0x14) bind$xdp(r2, &(0x7f00000001c0)={0x2c, 0x5, r4, 0x4}, 0x10) 07:58:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) bind(r0, &(0x7f00000001c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfb}, 0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r1, 0xf82}, 0x8) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0xfffffffffffffffb) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xa) r1 = accept$alg(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:28 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xfffffef8) 07:58:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x400) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r2, r3}}, 0x18) r4 = accept$alg(r0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r4, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r4, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0xd) 07:58:28 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x28000) r2 = getuid() getgroups(0x7, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee01, 0xee01, 0xee00]) fchownat(r1, &(0x7f0000000140)='./file0\x00', r2, r3, 0x1c00) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) fcntl$getflags(r0, 0x80000000000404) 07:58:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xff) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001200)={'team_slave_1\x00', r2}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r4, 0x100, 0x70bd28, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x20004000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0xfffffffffffffe35, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x4800) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x48000000000000, 0x40c441) r4 = open(&(0x7f0000000340)='./file0\x00', 0x4e3b95c566791521, 0x1c1) setsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000380)=0x430000000, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x3, 0xd5, 0x3, 0x1c, 0x80, 0x9, 0xfffffffffffffffa, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0xff, 0x3, 0x4, 0xfffffffffffffffa, 0x4a}}, &(0x7f00000001c0)=0xb0) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000003c0)={0x4, 0x6, 0x9, 0xffffffffffffffff, 0x10, 0x1, 0x5, 0x80000000, 0xc788, 0xffffffffffffff12, 0xfffffffffffffff8, 0x6}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000400)=0x6) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r5, @in={{0x2, 0x4e22, @empty}}, 0x8, 0x1000}, 0x90) 07:58:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0xe) 07:58:29 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="9ab08f92b99ce3dae5445e91033fc9fab6f03c5ee75d9d036e2ccb97efa35d1d768aac1c1431b412ffe3502c714f951587dfeba53232d4b2cb69a23c19c766ec13f1e2fc30debb9fa39b9003e0ab1ba5c43807dc984fbbe6b2c3e9cda90d89e836286ce2e6a70fcbd92c5b022aca957adb890b0067fc2f67624533cfa06e1ddabe4365e040d98e7777dc222c4426046dd07c5b78c237b58da556e35f4f16e997441ea6e90ef334705845903680748c5a819b36f2b6342efd8f28fb967d3bf28cbfccce6c7246c56606907b139bcc8a15dec353d7fe", 0xd5, 0x7e6}], 0x200040, &(0x7f0000000680)={[{@discard_size={'discard', 0x3d, 0x6}}, {@errors_continue='errors=continue'}, {@discard_size={'discard', 0x3d, 0x4}}, {@quota='quota'}, {@nodiscard='nodiscard'}, {@gid={'gid', 0x3d, r0}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '-user'}}, {@euid_gt={'euid>', r2}}]}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xfffffef8) 07:58:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="a49cae87d0e3ad49fc7bcc0b0790d7b5", 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x4000, 0x0) recvfrom$ax25(r1, &(0x7f0000000280)=""/79, 0x4f, 0x2, 0x0, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000180)=0x1) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000100)) [ 536.876970][ T7470] JFS: discard option not supported on device [ 536.964626][ T7470] JFS: discard option not supported on device [ 536.977762][ T7470] JFS: discard option not supported on device [ 536.999042][ T7470] JFS: discard option not supported on device 07:58:29 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)=""/226, 0xffffffffffffffde}, {&(0x7f0000000140)=""/123}, {&(0x7f00000005c0)=""/169}, {&(0x7f0000000440)=""/233}, {&(0x7f00000001c0)=""/13, 0xfffffffffffffe60}, {&(0x7f0000001440)=""/4096}], 0x10000092, 0x0, 0xffffff32}, 0x4}], 0x319, 0x0, 0x0) [ 537.046517][ T7470] jfs: Unrecognized mount option "smackfsdef=-user" or missing value 07:58:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0xf) 07:58:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0xfffffef8) 07:58:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000440)={0x20, 0x3, [0x7fff, 0x0, 0xef, 0xbc, 0x454], 0x200}) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRES16=r4, @ANYRESDEC=r2]], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r3, @ANYRES32=r5, @ANYRESOCT=r4, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES16=r1, @ANYRES64=r0, @ANYRES64=r4], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR, @ANYRES32], @ANYBLOB="da6283b201a237d43ce0a5b1279c77e532415c58c6c04616aae0827d3511e3c8e97ccdd0096f2a04e4c88be914cd9379256d3bc3b3d6f65c686b111c500156eb5734dbad4032fa692ff05db60e53ec6d99285e154064fde4ad5b91a650d685ea21a85f56721606b1519bce08d37d427d1edce63242b404edf31b46fce083558a64f9df2da01d7efad5ff65904deaa8ba563d8921da41f7c133ddcd5a69afbff5832c047b0abdb306eda12cf508"]], 0x18) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) ioprio_set$pid(0x2, r0, 0x5) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000800200000001000000010000000100000000000000000000e8010000e8010000e8010000e8010000e801000003000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000980000010000000000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001040002000400000009000000736e6d7000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e800000000000000000000000000000000000000000000000000280074746c0000000000000000000000000000000000000000000000000000000108000000000000280053594e50524f5859000000000000000000000000000000000000000000000809000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2e0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000000), &(0x7f0000000100)) 07:58:30 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x10) 07:58:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7f, 0x80000) bind$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x6}, 0x6e) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x808002}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x4) 07:58:30 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x86afc7c7, &(0x7f0000000000), 0x18}, 0xfffffffffffffffd) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x59c, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:31 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x11) 07:58:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x42, 0x0, 0x2}, 0x10) 07:58:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x43a3911a3962f4e2) 07:58:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200001, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000280)={0xe1, {{0xa, 0x4e23, 0x7b83e75a, @remote, 0x4}}, {{0xa, 0x4e20, 0x1000, @mcast2, 0x7fff}}}, 0x108) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0xffffffffffffff14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) r4 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in, 0x3, 0x2, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@initdev}}, 0xe8) connect$inet6(r4, &(0x7f0000000040), 0x1c) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0xe9, 0x8e, &(0x7f0000000580)="960e2bb8a1e58613a493fc6e564c11040335430c54ed3b8d8a6fed2505b43b38ef9a207a27ead9ff5dba95ce4bebb3d4bdad32e222a5c02c7081596b45f37d0ba6ced61eee8a1e124a8110c9dc3354d310f952bb0fce29f75093b49932eb46f0ce597c6ea846589a245d2f2f1c501894ca3e348410553c4c9a87321e42b0f686719fd143beab77c2c19981a627ff7bbe28e69401344c4e9f43037d47edfdb7c256294c4b51d6eb76a8c153530a9b1fb5aa1a285574102f11ee2067d0dcd84e4f073f42b01eec9bb95ef5ff76ca7cb5e1f710a7f53ed98871c0734918859f153261034eb0b22b9925a1", &(0x7f00000003c0)=""/142, 0xdd45}, 0x28) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x2) 07:58:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:31 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x12) 07:58:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2400, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount(&(0x7f0000000100)=@sr0='/dev/sr0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='ncpfs\x00', 0x10020, &(0x7f0000000200)='bpf\x00') 07:58:31 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x13) 07:58:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x0, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xf1f2, @media='ib\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8010}, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="c0dcd49ae2f408078f06707f31c517fb63aeeda09c0f7fef33a5cd55faed62ca7c764423549254e1da29c586754e4d66063419b63fab58a95fac33194db9be0202a4eea911317b355f2b8b3ae592e830") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) process_vm_readv(r4, &(0x7f0000000100)=[{&(0x7f0000000200)=""/69, 0x45}], 0x1, &(0x7f0000001380)=[{&(0x7f0000000280)=""/22, 0x16}, {&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:32 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9, 0x80000) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000140)={{0x9, 0x81, 0x3, 0x6}, 'syz0\x00', 0x13}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1205531, &(0x7f0000000280)={0x200, 0xffffffffffffea8e, 0x548fe220, 0x7f, [], [], [], 0xffffffffffff7fff, 0x3, 0xffffffffffffff16, 0x1ff, "8ded6b012454da442eef28aaa3e54a21"}) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x14) 07:58:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x8000) write$capi20(r1, &(0x7f0000000100)={0x10, 0x4af, 0x3, 0x83, 0x10001, 0x80000000}, 0x10) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0xfffffffffffffd28) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0), 0xffffffffffffffdd}, 0x0) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:32 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0xb0002, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x10040, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000001c0)={r1, 0x0, 0x100000000, 0xfffffffff0010000}) 07:58:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x15) 07:58:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) fadvise64(r1, 0x0, 0x83, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x4040000}, 0x80) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000180)={0x0, 0x13d, 0x0, [], &(0x7f0000000140)={0x990b6f, 0x8000000000, [], @p_u32=&(0x7f0000000100)=0x8}}) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) write$binfmt_misc(r2, &(0x7f0000000200)={'syz0', "98906f46c0c5d2f59459ae0a5e56adac7ee70c1871e825e1f8cbb9888ce3d9024e873ac778f40c80bd3c6c14ad96f4bf12b07a5eaa43c3346ea18637d4107bd7016e2f6adc4a82e16c639d8c2fce25"}, 0x53) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', 'bpf\x00'}) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:33 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x2be) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) mq_timedsend(r3, &(0x7f0000000100)="7f4c6dc203a8962f4bb0c94609e936d0ed867639d7c571cf4dea712f7d249ab173b76e16c3", 0x25, 0x1, &(0x7f0000000140)={0x77359400}) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(lrw-camellia-aesni-avx2,sha224-avx2)\x00'}, 0x58) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0xc7, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x2, 0x0) 07:58:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x16) 07:58:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) finit_module(r1, &(0x7f0000000040)='memory.events\x00', 0x2) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/80) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'ip_vti0\x00', {0x2, 0x4e21, @remote}}) socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:33 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1f, 0x40) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x78, r4, 0x9bb72081808bd5c6, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x6, 0x7ff, 0x4, 0x7, 0x3f]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x8, 0x2, 0x67ea, 0x7fff]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x101, 0x7, 0x63c1fac0, 0x7, 0xffffffffffff2656]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xb05a}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x9425995c968619ef}, 0x4000000) sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x17) 07:58:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) process_vm_readv(r4, &(0x7f0000000100)=[{&(0x7f0000000200)=""/69, 0x45}], 0x1, &(0x7f0000001380)=[{&(0x7f0000000280)=""/22, 0x16}, {&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, 0x0, 0xb00, 0x0, 0x25dfdbfb}, 0x1c}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='vboxnet0-\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) getpgrp(r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x5890, 0x0) 07:58:33 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x1f}, 0xb85}, {0xa, 0x4e22, 0x100000001, @dev={0xfe, 0x80, [], 0x23}, 0x2}, 0xffffffffffff0000, [0x10001, 0x7, 0x3, 0x40, 0x200, 0xa000, 0x3, 0x7aaf6192]}, 0x5c) write$binfmt_script(r1, &(0x7f0000000ac0)={'#! ', './file0', [{0x20, '#! '}, {0x20, 'vmnet0\x01\x00\x01\x001ptp0'}, {}, {0x20, 'wlan0'}, {0x20, 'cgroup'}, {0x20, '/proc/sys/net/ipv4/vs/pmtu_disc\x00'}, {0x20, '*)securityGPL:'}], 0xa, "01bef44ccfecf4f938ab2866bd05951462f41d2d28c9a440e0a54803a14f2d450e6414ae2a3117f62616c3895a513bcfcdff3180e2bcf382229988a3872a07ef47b24c4167fee3589c1a00a678da26df080b8d97ef10a993711c613243b9289cc96bf1f00f334fa82a140fe7628e64f2a97d32e744e3f203070728e0b1d0890e8a863b8671caf36a64c7ef9d486171c80b930fc538bd8b6c4f2d9c355903200dc59ed6a5e4d32c81ef5798a07828f08bcf9771f211817a7a7c7fd29a4d43eda25308606c99bea73447cd29982a532b7da83700c6c7f99c28dd729979ee4d2c1d396d629fbd83440439b28d"}, 0x148) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000001440)=""/4096) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x4c, r2, 0x900, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r1, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000340)={0x7, 0x9}) ioctl(r4, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r3, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0xa7, "3f81cf005523845791358c4bea04efaae775841b76c704d73bfdc99e70de00a706b7e055cfb110f3ef7d0a539e09d211b4f05e348b39d9242daae700aa7c8129ca98959b95aeadeef8a73d8f54edcc87dc5451c5a3434a126d2afb985fe61b6c27f9d45e2a035df97a51446c9933ed8b6a45daebd8ae345ddbbd3c91fbd83244328f5ffe6136f10111e32bbee54dfc21e6c764e453da29b7f6551cdd2bd9e88b2f4ac14e52dd9b"}, &(0x7f0000000180)=0xaf) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r5, 0x6, 0x9}, 0x8) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) recvmmsg(r3, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) write$evdev(r1, &(0x7f00000004c0)=[{{r6, r7/1000+30000}, 0x17, 0x2, 0x9}], 0x18) 07:58:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x18) 07:58:34 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000190000000000000008006c6f00000000000000000000000000007465716e3000009fa3f0cdbc66daee006970365f76746930000000000000000062637366300000000000000000000000ffffffffffff000000000000aeaaaaaaaa000000000000000000e2010000100200004002000069700000000000000000000000000000000000000000000000000000000000002000000000000000ac1414bbffffff000000000000000000062d00000000000000000000000000636f6d6d656e740000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000b5b72e1ec479f8d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d19c256938a3b919a0a9add4eaa4088500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800"/672]}, 0x318) 07:58:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8200, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_uring_setup(0x299, &(0x7f0000000100)={0x0, 0x0, 0x6, 0x0, 0x2de}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = accept(r2, &(0x7f0000000180)=@nfc, &(0x7f0000000000)=0x80) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000280)=""/61, &(0x7f00000002c0)=0x3d) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$alg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x300}}, 0x0) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)=""/188, 0xbc}], 0x1}}], 0x1, 0x0, 0x0) 07:58:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x19) 07:58:34 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) process_vm_readv(r4, &(0x7f0000000100)=[{&(0x7f0000000200)=""/69, 0x45}], 0x1, &(0x7f0000001380)=[{&(0x7f0000000280)=""/22, 0x16}, {&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x400000, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000140)=0x80000001, &(0x7f00000001c0)=0x2) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) 07:58:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r2, &(0x7f0000000200)=""/18, 0x12) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x67e, 0x2000) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x1a) 07:58:35 executing program 4: clone(0x803601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/672]}, 0x318) 07:58:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="41670000000000008ef1"], 0x0, 0xa}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd]}) ioctl$KVM_RUN(r3, 0xae80, 0x1b) 07:58:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x846aee43b0339d64, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000140)) 07:58:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000200)={r3, @in={{0x2, 0x0, @rand_addr=0x7}}}, 0x84) socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 07:58:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) process_vm_readv(r4, &(0x7f0000000100)=[{&(0x7f0000000200)=""/69, 0x45}], 0x1, &(0x7f0000001380)=[{&(0x7f0000000280)=""/22, 0x16}, {&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) [ 694.397332][ T1043] INFO: task syz-executor.0:10858 blocked for more than 143 seconds. [ 694.405646][ T1043] Not tainted 5.2.0-rc3+ #19 [ 694.410892][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 694.420215][ T1043] syz-executor.0 D28128 10858 8803 0x00004004 [ 694.426560][ T1043] Call Trace: [ 694.429976][ T1043] __schedule+0x7cb/0x1560 [ 694.434426][ T1043] ? __sched_text_start+0x8/0x8 [ 694.439354][ T1043] schedule+0xa8/0x260 [ 694.443433][ T1043] schedule_timeout+0x717/0xc50 [ 694.448496][ T1043] ? wait_for_completion+0x294/0x440 [ 694.453801][ T1043] ? find_held_lock+0x35/0x130 [ 694.458670][ T1043] ? usleep_range+0x170/0x170 [ 694.463372][ T1043] ? kasan_check_write+0x14/0x20 [ 694.468398][ T1043] ? _raw_spin_unlock_irq+0x28/0x90 [ 694.473610][ T1043] ? wait_for_completion+0x294/0x440 [ 694.479199][ T1043] ? _raw_spin_unlock_irq+0x28/0x90 [ 694.484419][ T1043] ? lockdep_hardirqs_on+0x418/0x5d0 [ 694.490041][ T1043] ? trace_hardirqs_on+0x67/0x220 [ 694.495076][ T1043] ? kasan_check_read+0x11/0x20 [ 694.499999][ T1043] wait_for_completion+0x29c/0x440 [ 694.505126][ T1043] ? try_to_wake_up+0xc8/0x13f0 [ 694.510094][ T1043] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 694.516611][ T1043] ? wake_up_q+0xf0/0xf0 [ 694.520936][ T1043] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 694.527012][ T1043] kthread_stop+0x10b/0x6c0 [ 694.531555][ T1043] io_finish_async+0x73/0x140 [ 694.536240][ T1043] io_ring_ctx_wait_and_kill+0x133/0x5d0 [ 694.541973][ T1043] io_uring_release+0x42/0x50 [ 694.546659][ T1043] __fput+0x2ff/0x890 [ 694.551347][ T1043] ? io_ring_ctx_wait_and_kill+0x5d0/0x5d0 [ 694.557282][ T1043] ____fput+0x16/0x20 [ 694.561282][ T1043] task_work_run+0x145/0x1c0 [ 694.565991][ T1043] exit_to_usermode_loop+0x273/0x2c0 [ 694.571410][ T1043] do_syscall_64+0x58e/0x680 [ 694.576018][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.582178][ T1043] RIP: 0033:0x412f61 [ 694.586091][ T1043] Code: 84 3e 02 00 00 48 8b 08 48 8b 54 24 70 48 39 d1 0f 85 41 01 00 00 0f b6 48 17 f6 c1 40 0f 85 99 00 00 00 0f b6 0d 63 a7 3a 01 <84> c9 0f 84 80 00 00 00 48 8b 48 20 31 d2 31 db eb 04 48 83 c2 08 [ 694.606000][ T1043] RSP: 002b:00007fff077e1300 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 694.614496][ T1043] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000412f61 [ 694.622541][ T1043] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000005 [ 694.630705][ T1043] RBP: 0000000000000000 R08: 0000000000761220 R09: ffffffffffffffff [ 694.638817][ T1043] R10: 00007fff077e13d0 R11: 0000000000000293 R12: 0000000000761228 [ 694.646991][ T1043] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 694.655106][ T1043] [ 694.655106][ T1043] Showing all locks held in the system: [ 694.663076][ T1043] 1 lock held by khungtaskd/1043: [ 694.668168][ T1043] #0: 0000000004de6a42 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 694.678245][ T1043] 1 lock held by rsyslogd/8671: [ 694.683091][ T1043] #0: 000000008ee80c4f (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 694.691850][ T1043] 2 locks held by getty/8761: [ 694.696551][ T1043] #0: 00000000f3780e65 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.705774][ T1043] #1: 00000000efdf4a00 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.715644][ T1043] 2 locks held by getty/8762: [ 694.720380][ T1043] #0: 0000000082b70b58 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.741017][ T1043] #1: 00000000f36fe1ab (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.750703][ T1043] 2 locks held by getty/8763: [ 694.755492][ T1043] #0: 000000002373aac1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.764582][ T1043] #1: 00000000ec0a1f27 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.774228][ T1043] 2 locks held by getty/8764: [ 694.778992][ T1043] #0: 00000000b070e6b5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.788070][ T1043] #1: 00000000b4e0d9f9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.797903][ T1043] 2 locks held by getty/8765: [ 694.802596][ T1043] #0: 00000000eeb83ee8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.812294][ T1043] #1: 0000000080c7c6ed (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.822006][ T1043] 2 locks held by getty/8766: [ 694.826856][ T1043] #0: 000000001bc2d300 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.844283][ T1043] #1: 000000005df9a56a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.853983][ T1043] 2 locks held by getty/8767: [ 694.858745][ T1043] #0: 00000000335f9cb5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 694.867940][ T1043] #1: 00000000215bc4ca (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 694.877749][ T1043] [ 694.880097][ T1043] ============================================= [ 694.880097][ T1043] [ 694.888670][ T1043] NMI backtrace for cpu 0 [ 694.893025][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.2.0-rc3+ #19 [ 694.900565][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.910738][ T1043] Call Trace: [ 694.914117][ T1043] dump_stack+0x172/0x1f0 [ 694.918468][ T1043] nmi_cpu_backtrace.cold+0x63/0xa4 [ 694.923790][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 694.929425][ T1043] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 694.935414][ T1043] arch_trigger_cpumask_backtrace+0x14/0x20 [ 694.941365][ T1043] watchdog+0x9b7/0xec0 [ 694.945534][ T1043] kthread+0x354/0x420 [ 694.949601][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 694.955322][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 694.961580][ T1043] ret_from_fork+0x24/0x30 [ 694.966312][ T1043] Sending NMI from CPU 0 to CPUs 1: [ 694.972087][ C1] NMI backtrace for cpu 1 [ 694.972094][ C1] CPU: 1 PID: 2540 Comm: kworker/u4:4 Not tainted 5.2.0-rc3+ #19 [ 694.972100][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.972104][ C1] Workqueue: bat_events batadv_nc_worker [ 694.972112][ C1] RIP: 0010:preempt_count_sub+0x67/0x160 [ 694.972125][ C1] Code: 75 18 65 8b 05 22 81 b4 7e 25 ff ff ff 7f 39 c3 7f 1b 81 fb fe 00 00 00 76 6b 65 8b 05 0a 81 b4 7e f7 db 65 01 1d 01 81 b4 7e <5b> 5d c3 e8 51 d7 e3 01 85 c0 74 f4 48 c7 c0 30 bb 80 89 48 ba 00 [ 694.972129][ C1] RSP: 0018:ffff8880a14dfc08 EFLAGS: 00000083 [ 694.972138][ C1] RAX: 0000000080000201 RBX: 00000000fffffe00 RCX: 0000000000000000 [ 694.972143][ C1] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000200 [ 694.972149][ C1] RBP: ffff8880a14dfc10 R08: 0000000000000001 R09: ffffed100c5a3be2 [ 694.972154][ C1] R10: ffffed100c5a3be1 R11: ffff888062d1df0b R12: ffffffff87001345 [ 694.972160][ C1] R13: ffff8880a14ce480 R14: ffffffff87001c70 R15: 0000000000000007 [ 694.972166][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 694.972171][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 694.972176][ C1] CR2: ffffffffff600400 CR3: 000000008d743000 CR4: 00000000001406e0 [ 694.972182][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 694.972187][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 694.972190][ C1] Call Trace: [ 694.972194][ C1] __local_bh_enable_ip+0x139/0x270 [ 694.972198][ C1] _raw_spin_unlock_bh+0x31/0x40 [ 694.972202][ C1] batadv_nc_purge_paths+0x265/0x370 [ 694.972205][ C1] batadv_nc_worker+0x29c/0x760 [ 694.972209][ C1] process_one_work+0x989/0x1790 [ 694.972213][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 694.972217][ C1] ? lock_acquire+0x16f/0x3f0 [ 694.972221][ C1] worker_thread+0x98/0xe40 [ 694.972225][ C1] ? trace_hardirqs_on+0x67/0x220 [ 694.972228][ C1] kthread+0x354/0x420 [ 694.972232][ C1] ? process_one_work+0x1790/0x1790 [ 694.972236][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 694.972240][ C1] ret_from_fork+0x24/0x30 [ 694.973453][ T1043] Kernel panic - not syncing: hung_task: blocked tasks [ 695.189132][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.2.0-rc3+ #19 [ 695.196750][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.207075][ T1043] Call Trace: [ 695.210378][ T1043] dump_stack+0x172/0x1f0 [ 695.214706][ T1043] panic+0x2cb/0x744 [ 695.218651][ T1043] ? __warn_printk+0xf3/0xf3 [ 695.223306][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 695.228962][ T1043] ? ___preempt_schedule+0x16/0x18 [ 695.234118][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 695.240406][ T1043] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 695.246694][ T1043] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 695.252875][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 695.259052][ T1043] watchdog+0x9c8/0xec0 [ 695.263213][ T1043] kthread+0x354/0x420 [ 695.267275][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 695.272833][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 695.279197][ T1043] ret_from_fork+0x24/0x30 [ 695.285494][ T1043] Kernel Offset: disabled [ 695.289889][ T1043] Rebooting in 86400 seconds..