dmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000400053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e3709", 0x1d}], 0x1}, 0x0) 04:18:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x400454ca, r1) 04:18:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000a00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800c00e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:18:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40047459, r1) 04:18:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:18:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40049409, r1) 04:18:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000040053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:18:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008006000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:18:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008006f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40081271, r1) 04:18:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:18:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800006c053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800f000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40101283, r1) 04:18:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:18:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000ec0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:18:25 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40080000f0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40101286, r1) 04:18:26 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:18:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000002053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40101288, r1) 04:18:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 5: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:18:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 04:18:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800c00e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='oom_score_adj\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 04:18:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4010640d, r1) 04:18:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000004053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 04:18:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:27 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, r1) 04:18:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800003f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 329.430931][T12483] FAULT_INJECTION: forcing a failure. [ 329.430931][T12483] name failslab, interval 1, probability 0, space 0, times 0 [ 329.462141][T12483] CPU: 0 PID: 12483 Comm: syz-executor.0 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 329.472089][T12483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.482155][T12483] Call Trace: [ 329.485473][T12483] dump_stack+0x197/0x210 [ 329.489824][T12483] should_fail.cold+0xa/0x10 [ 329.494436][T12483] ? setup_fault_attr+0x220/0x220 [ 329.499477][T12483] ? ___might_sleep+0x163/0x2c0 [ 329.504349][T12483] __should_failslab+0x121/0x190 [ 329.509326][T12483] should_failslab+0x9/0x14 [ 329.513836][T12483] __kmalloc+0x2e0/0x770 [ 329.518095][T12483] ? __might_fault+0x12b/0x1e0 [ 329.522882][T12483] ? rw_copy_check_uvector+0x31a/0x390 [ 329.528361][T12483] rw_copy_check_uvector+0x31a/0x390 [ 329.533678][T12483] ? lock_downgrade+0x920/0x920 [ 329.538543][T12483] import_iovec+0xc9/0x410 [ 329.542978][T12483] ? dup_iter+0x260/0x260 [ 329.547324][T12483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.553573][T12483] ? _copy_from_user+0x12c/0x1a0 [ 329.558521][T12483] copy_msghdr_from_user+0x2ce/0x440 [ 329.563818][T12483] ? move_addr_to_kernel.part.0+0x110/0x110 [ 329.569722][T12483] ? __lockdep_free_key_range+0x120/0x120 [ 329.575463][T12483] ? __fget+0x35d/0x550 [ 329.579631][T12483] ? find_held_lock+0x35/0x130 [ 329.584427][T12483] sendmsg_copy_msghdr+0x3d/0x70 [ 329.589381][T12483] ___sys_sendmsg+0xd0/0x170 [ 329.593987][T12483] ? sendmsg_copy_msghdr+0x70/0x70 [ 329.599109][T12483] ? __kasan_check_read+0x11/0x20 [ 329.604161][T12483] ? __fget+0x37f/0x550 [ 329.608334][T12483] ? do_dup2+0x4f0/0x4f0 [ 329.612592][T12483] ? __fget_light+0x1a9/0x230 [ 329.617283][T12483] ? __fdget+0x1b/0x20 [ 329.621358][T12483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.627616][T12483] __sys_sendmsg+0x105/0x1d0 [ 329.632216][T12483] ? __sys_sendmsg_sock+0xc0/0xc0 [ 329.637254][T12483] ? ksys_write+0x1cf/0x290 [ 329.641775][T12483] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.647249][T12483] ? do_syscall_64+0x26/0x790 [ 329.651947][T12483] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.658025][T12483] ? do_syscall_64+0x26/0x790 [ 329.662724][T12483] __x64_sys_sendmsg+0x78/0xb0 [ 329.667507][T12483] do_syscall_64+0xfa/0x790 [ 329.672643][T12483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.678551][T12483] RIP: 0033:0x45af49 [ 329.682458][T12483] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.702238][T12483] RSP: 002b:00007f762a078c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 329.710671][T12483] RAX: ffffffffffffffda RBX: 00007f762a078c90 RCX: 000000000045af49 [ 329.718664][T12483] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 04:18:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 329.726652][T12483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 329.734643][T12483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f762a0796d4 [ 329.742636][T12483] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 04:18:27 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x401070ca, r1) 04:18:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000040053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 04:18:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 330.094623][T12508] FAULT_INJECTION: forcing a failure. [ 330.094623][T12508] name failslab, interval 1, probability 0, space 0, times 0 04:18:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 330.198707][T12508] CPU: 1 PID: 12508 Comm: syz-executor.0 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 330.208658][T12508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.218834][T12508] Call Trace: [ 330.222154][T12508] dump_stack+0x197/0x210 [ 330.222178][T12508] should_fail.cold+0xa/0x10 [ 330.222197][T12508] ? setup_fault_attr+0x220/0x220 [ 330.222219][T12508] ? ___might_sleep+0x163/0x2c0 [ 330.241008][T12508] __should_failslab+0x121/0x190 [ 330.245961][T12508] should_failslab+0x9/0x14 [ 330.245983][T12508] kmem_cache_alloc_node_trace+0x274/0x750 [ 330.256276][T12508] ? _raw_spin_unlock_bh+0x2c/0x30 [ 330.261403][T12508] ? release_sock+0x156/0x1c0 [ 330.266097][T12508] __get_vm_area_node+0x12f/0x3b0 [ 330.266121][T12508] __vmalloc_node_range+0xce/0x790 [ 330.276240][T12508] ? netlink_sendmsg+0x685/0xea0 [ 330.281203][T12508] ? netlink_sendmsg+0x685/0xea0 [ 330.286161][T12508] vmalloc+0x6b/0x90 [ 330.290076][T12508] ? netlink_sendmsg+0x685/0xea0 04:18:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800006f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 330.295032][T12508] netlink_sendmsg+0x685/0xea0 [ 330.299819][T12508] ? netlink_unicast+0x7d0/0x7d0 [ 330.304777][T12508] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 330.310351][T12508] ? apparmor_socket_sendmsg+0x2a/0x30 [ 330.315825][T12508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.322087][T12508] ? security_socket_sendmsg+0x8d/0xc0 [ 330.327565][T12508] ? netlink_unicast+0x7d0/0x7d0 [ 330.332529][T12508] sock_sendmsg+0xd7/0x130 [ 330.336971][T12508] ____sys_sendmsg+0x753/0x880 [ 330.341756][T12508] ? kernel_sendmsg+0x50/0x50 04:18:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 330.346447][T12508] ? __fget+0x35d/0x550 [ 330.350620][T12508] ? find_held_lock+0x35/0x130 [ 330.355414][T12508] ___sys_sendmsg+0x100/0x170 [ 330.360113][T12508] ? sendmsg_copy_msghdr+0x70/0x70 [ 330.365242][T12508] ? __kasan_check_read+0x11/0x20 [ 330.370281][T12508] ? __fget+0x37f/0x550 [ 330.374459][T12508] ? do_dup2+0x4f0/0x4f0 [ 330.374486][T12508] ? __fget_light+0x1a9/0x230 [ 330.374505][T12508] ? __fdget+0x1b/0x20 [ 330.374521][T12508] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.374545][T12508] __sys_sendmsg+0x105/0x1d0 [ 330.393998][T12508] ? __sys_sendmsg_sock+0xc0/0xc0 [ 330.394031][T12508] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 330.409083][T12508] ? do_syscall_64+0x26/0x790 [ 330.409104][T12508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.409125][T12508] ? do_syscall_64+0x26/0x790 [ 330.424539][T12508] __x64_sys_sendmsg+0x78/0xb0 [ 330.429410][T12508] do_syscall_64+0xfa/0x790 [ 330.433943][T12508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.439846][T12508] RIP: 0033:0x45af49 04:18:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000ec0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 330.443752][T12508] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.463367][T12508] RSP: 002b:00007f762a078c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 330.471791][T12508] RAX: ffffffffffffffda RBX: 00007f762a078c90 RCX: 000000000045af49 [ 330.479769][T12508] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 330.487746][T12508] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:18:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 330.495727][T12508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f762a0796d4 [ 330.503710][T12508] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 330.809769][T12508] syz-executor.0: vmalloc: allocation failure: 213312 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 330.838864][T12508] CPU: 0 PID: 12508 Comm: syz-executor.0 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 330.848814][T12508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.858879][T12508] Call Trace: [ 330.862251][T12508] dump_stack+0x197/0x210 [ 330.866580][T12508] warn_alloc.cold+0x87/0x164 [ 330.871242][T12508] ? zone_watermark_ok_safe+0x260/0x260 [ 330.876782][T12508] ? kmem_cache_alloc_node_trace+0x398/0x750 [ 330.882756][T12508] ? __get_vm_area_node+0x2e7/0x3b0 [ 330.887941][T12508] __vmalloc_node_range+0x44c/0x790 [ 330.893127][T12508] ? netlink_sendmsg+0x685/0xea0 [ 330.898063][T12508] vmalloc+0x6b/0x90 [ 330.901978][T12508] ? netlink_sendmsg+0x685/0xea0 [ 330.906929][T12508] netlink_sendmsg+0x685/0xea0 [ 330.911684][T12508] ? netlink_unicast+0x7d0/0x7d0 [ 330.916640][T12508] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 330.922259][T12508] ? apparmor_socket_sendmsg+0x2a/0x30 [ 330.927728][T12508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.933961][T12508] ? security_socket_sendmsg+0x8d/0xc0 [ 330.939397][T12508] ? netlink_unicast+0x7d0/0x7d0 [ 330.944318][T12508] sock_sendmsg+0xd7/0x130 [ 330.949252][T12508] ____sys_sendmsg+0x753/0x880 [ 330.954036][T12508] ? kernel_sendmsg+0x50/0x50 [ 330.958690][T12508] ? __fget+0x35d/0x550 [ 330.962851][T12508] ? find_held_lock+0x35/0x130 [ 330.967636][T12508] ___sys_sendmsg+0x100/0x170 [ 330.972301][T12508] ? sendmsg_copy_msghdr+0x70/0x70 [ 330.977397][T12508] ? __kasan_check_read+0x11/0x20 [ 330.982424][T12508] ? __fget+0x37f/0x550 [ 330.986581][T12508] ? do_dup2+0x4f0/0x4f0 [ 330.990812][T12508] ? __fget_light+0x1a9/0x230 [ 330.995472][T12508] ? __fdget+0x1b/0x20 [ 330.999524][T12508] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.005750][T12508] __sys_sendmsg+0x105/0x1d0 [ 331.010322][T12508] ? __sys_sendmsg_sock+0xc0/0xc0 [ 331.015337][T12508] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.020783][T12508] ? do_syscall_64+0x26/0x790 [ 331.025442][T12508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.031484][T12508] ? do_syscall_64+0x26/0x790 [ 331.036145][T12508] __x64_sys_sendmsg+0x78/0xb0 [ 331.040888][T12508] do_syscall_64+0xfa/0x790 [ 331.045378][T12508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.051248][T12508] RIP: 0033:0x45af49 [ 331.055126][T12508] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.074757][T12508] RSP: 002b:00007f762a078c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 331.083151][T12508] RAX: ffffffffffffffda RBX: 00007f762a078c90 RCX: 000000000045af49 [ 331.091104][T12508] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 331.099067][T12508] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 331.107030][T12508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f762a0796d4 [ 331.114980][T12508] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 [ 331.126605][T12508] Mem-Info: [ 331.129770][T12508] active_anon:178161 inactive_anon:231 isolated_anon:0 [ 331.129770][T12508] active_file:7690 inactive_file:42096 isolated_file:0 [ 331.129770][T12508] unevictable:0 dirty:136 writeback:0 unstable:0 [ 331.129770][T12508] slab_reclaimable:14352 slab_unreclaimable:96704 [ 331.129770][T12508] mapped:60164 shmem:301 pagetables:1074 bounce:0 [ 331.129770][T12508] free:1177110 free_pcp:540 free_cma:0 [ 331.167892][T12508] Node 0 active_anon:712644kB inactive_anon:924kB active_file:30620kB inactive_file:168384kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:240656kB dirty:540kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 643072kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 331.197032][T12508] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 331.223935][T12508] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 331.253901][T12508] lowmem_reserve[]: 0 2532 2532 2532 2532 [ 331.259637][T12508] Node 0 DMA32 free:926012kB min:36068kB low:45084kB high:54100kB reserved_highatomic:0KB active_anon:712644kB inactive_anon:924kB active_file:30620kB inactive_file:168384kB unevictable:0kB writepending:540kB present:3129332kB managed:2596496kB mlocked:0kB kernel_stack:7488kB pagetables:4292kB bounce:0kB free_pcp:2156kB local_pcp:1220kB free_cma:0kB [ 331.292435][T12508] lowmem_reserve[]: 0 0 0 0 0 [ 331.297140][T12508] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 331.325365][T12508] lowmem_reserve[]: 0 0 0 0 0 [ 331.330111][T12508] Node 1 Normal free:3766312kB min:53820kB low:67272kB high:80724kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 331.360850][T12508] lowmem_reserve[]: 0 0 0 0 0 [ 331.366908][T12508] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 331.381336][T12508] Node 0 DMA32: 10651*4kB (UME) 36*8kB (UME) 13*16kB (UME) 639*32kB (UME) 206*64kB (UE) 56*128kB (UME) 14*256kB (UME) 7*512kB (UME) 3*1024kB (UME) 2*2048kB (UM) 202*4096kB (M) = 925628kB [ 331.399846][T12508] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 331.411339][T12508] Node 1 Normal: 20*4kB (UM) 127*8kB (UME) 194*16kB (UME) 76*32kB (UME) 35*64kB (UM) 19*128kB (UME) 8*256kB (U) 4*512kB (UE) 3*1024kB (UME) 2*2048kB (ME) 914*4096kB (M) = 3766312kB [ 331.429316][T12508] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 331.438914][T12508] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 331.448306][T12508] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 04:18:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 3: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r6) socketpair$unix(0x1, 0x92e4ad8efd91bd80, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r7) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r8, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r7, &(0x7f0000000040), 0xfdef}]) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r10 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r11 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r12 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r10, 0x4c00, r11) ioctl$LOOP_CHANGE_FD(r10, 0x4c06, r12) io_submit(r8, 0x3, &(0x7f0000000440)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f00000001c0)="9b396dbe68b6cc61ec96441066e483c9a3d729d78e2f16af6299f86faf44f99f35d7fa11b69ca99c939b727f9d9c11da48552471482b3575a4a693214d5355ccdf376ec18c44069aa3374570e4aacf311dc54b71d6dcaca4fb8ba4e4ed6373c983221bc91166e15a0e5aa8adbb3eb6522ca4b6458e95821e92", 0x79, 0x70, 0x0, 0x3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x5, r9, &(0x7f0000000280)="e03f420c5b2739bb04652714146e2267fe9959245d8c48a493f0ddf8be0cac9d169cd33d1d52d7165f5fd6435a98e9e5b17495302697403c51deb4b612062b613f5a66e23854f03a46c7539d35de35d7f42bd377c2ed4b0cec3b98a26042920634ac3203603bb1191d7b801c41bad0b8181428e72a", 0x75, 0x2, 0x0, 0x0, r12}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x7, r0, &(0x7f0000000340)="9c62fcbf4a6d9fc52527ef53395d36948d2fbd32bf5bf72980d0ce75832a3c4ef625608428e010db4a80c2e14855facf040f97e048d54150c00c9cd4ec26352bd59e03544c180411d628e84089dded5c35cec3f0ee6e8059273e2e378398e82b0e0f0cfaf4dae0aa8d09f1bd64af22a3474729e1b1666237478de479ecf3edca6dc46be1427f13c558dcf5862375b44d2aba50f0f7ac80464ae85727e19ff4a4e1b3682f8ee3caea4102fff70bbd9426", 0xb0, 0x1f, 0x0, 0x1, r3}]) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000080)={0x0, 0x0, r6}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={r13}) r14 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r15 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20042, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r15, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(r14, 0x4c06, r15) 04:18:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x401070cd, r1) 04:18:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 04:18:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800006c053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40080000f0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 331.457899][T12508] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 331.467289][T12508] 47042 total pagecache pages [ 331.473240][T12508] 0 pages in swap cache [ 331.477419][T12508] Swap cache stats: add 0, delete 0, find 0/0 [ 331.483578][T12508] Free swap = 0kB [ 331.487299][T12508] Total swap = 0kB [ 331.491058][T12508] 1965979 pages RAM [ 331.494917][T12508] 0 pages HighMem/MovableOnly [ 331.499589][T12508] 345328 pages reserved [ 331.503804][T12508] 0 pages cma reserved 04:18:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000002053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:18:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="0f0000003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 331.684733][T12545] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:18:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x40186366, r1) [ 331.839604][T12560] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="140000003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) inotify_init1(0x800) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x4, 0x400000) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000080)={0x7, 0x2, 0x1000}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:18:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:18:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="354800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:18:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000004053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000403582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x401870c8, r1) 04:18:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x80) ioctl$CAPI_CLR_FLAGS(r2, 0x80044325, &(0x7f0000000080)) 04:18:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000001b13582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:18:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x401870cb, r1) 04:18:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000030082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:18:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2eb101003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="6be87889ef9b295b8fb4a1350835828f4233837c1fdfd7854e3386114e61f39020d7238e0f4c0bb2ec67f1cc256b6a54558556b4d912c4fe24d0f5314540428979279aa2f5f3da470ec4c46e5a4667488533589f11a3cd09aa07328f8cf7927edd0822bf7019f958c61f8fb70ccc9ac67b1d728a08724f88374e206ea5ae9f0bd9f2015a8da037107775653c522d5d10096e390db0fb55ad7564e67d51ec8527d297bf9d2530a31e8cce2f76b381eb8e925f3c139bc879db033722905137d5decce953d3f6c6eacb8b26f7cd8a8db66aff56b1a49ce8", 0xd6, r0) keyctl$revoke(0x3, r2) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000001c0)={r6, 0x3ff}, 0x8) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x926dcded249574f6, 0x0) r8 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r10 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r9) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000140)="3080", 0x2, r10) keyctl$reject(0x13, r8, 0x2, 0xfffffffffffffffe, r10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r7) 04:18:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 332.955400][T12639] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000083582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4802003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 333.016916][T12644] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070000", 0x13}], 0x1}, 0x0) 04:18:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x401870cc, r1) 04:18:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) recvmsg$can_j1939(r2, &(0x7f0000000200)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/178, 0x3f}], 0x1, &(0x7f00000001c0)=""/14, 0xe}, 0x395f8e5779622eac) 04:18:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4803003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4020940d, r1) 04:18:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070000", 0x13}], 0x1}, 0x0) [ 333.432540][T12665] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4804003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x74e040) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400800006f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070000", 0x13}], 0x1}, 0x0) 04:18:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x80041284, r1) 04:18:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480a003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40080000001a4882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000040)=0x10000) 04:18:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e3709", 0x1d}], 0x1}, 0x0) 04:18:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480e003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x80041285, r1) 04:18:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e3709", 0x1d}], 0x1}, 0x0) 04:18:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480f003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000403582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={r3, @in={{0x2, 0x4e20, @multicast1}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r4, 0x4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e21, 0x2, @local, 0x2}}, 0x400, 0x200}, &(0x7f0000000280)=0x90) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r7) 04:18:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e3709", 0x1d}], 0x1}, 0x0) 04:18:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x7fffffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x2000, @empty, 0x26}}}, &(0x7f0000000200)=0x84) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4860003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000001b13582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x800454d2, r1) 04:18:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:18:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48f0003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:18:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x80081270, r1) 04:18:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000030082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x10000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48f3003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:18:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000083582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x80081272, r1) 04:18:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800033000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$BLKDISCARD(r4, 0x1277, &(0x7f0000000040)=0x3) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) 04:18:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:18:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000a3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:18:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x80086301, r1) 04:18:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:18:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x43935d86, 0x0, 0x80000000, 0x5abe, 0x0, 0x8000, 0x9}, 0x1c) 04:18:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000e3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40080000001a4882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:18:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc0045878, r1) [ 336.206106][T12850] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48c00e3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 336.335019][T12865] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:18:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1b8201, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x379, 0x6, 0x2}) 04:18:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000f3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:18:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc0045878, r1) 04:18:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 336.665218][T12884] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 336.783952][T12884] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800403000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000040)={0x0, 0x20303159, 0x3, 0x4, 0x1, @discrete={0xfffffff9, 0x6}}) 04:18:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc004743e, r1) 04:18:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800603000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 337.220734][T12918] FAULT_INJECTION: forcing a failure. [ 337.220734][T12918] name failslab, interval 1, probability 0, space 0, times 0 [ 337.267599][T12918] CPU: 1 PID: 12918 Comm: syz-executor.5 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 337.277546][T12918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.287617][T12918] Call Trace: [ 337.290934][T12918] dump_stack+0x197/0x210 [ 337.295288][T12918] should_fail.cold+0xa/0x10 [ 337.299899][T12918] ? setup_fault_attr+0x220/0x220 [ 337.304950][T12918] ? ___might_sleep+0x163/0x2c0 [ 337.309837][T12918] __should_failslab+0x121/0x190 04:18:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000001c0)={0x7}, 0x4) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8c816d2f4da4a4dd513228b4cdf1a0200009d1c000000000000f807000000020000e9ffffff", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0xfffffffc, 0x7, 0x0, 0x8, 0x2}, 0x14) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r3 = syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x9, 0x34, 0x2007, 0x5, 0xb, 0x2, 0x2}}) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000800000f8020000f802800800000000f800"/88, @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 337.314797][T12918] should_failslab+0x9/0x14 [ 337.319320][T12918] __kmalloc+0x2e0/0x770 [ 337.323587][T12918] ? __might_fault+0x12b/0x1e0 [ 337.328372][T12918] ? rw_copy_check_uvector+0x31a/0x390 [ 337.333859][T12918] rw_copy_check_uvector+0x31a/0x390 [ 337.339169][T12918] ? lock_downgrade+0x920/0x920 [ 337.344046][T12918] import_iovec+0xc9/0x410 [ 337.348483][T12918] ? dup_iter+0x260/0x260 [ 337.352841][T12918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.359098][T12918] ? _copy_from_user+0x12c/0x1a0 [ 337.364059][T12918] copy_msghdr_from_user+0x2ce/0x440 [ 337.369386][T12918] ? move_addr_to_kernel.part.0+0x110/0x110 [ 337.375305][T12918] ? __lockdep_free_key_range+0x120/0x120 [ 337.381044][T12918] ? __fget+0x35d/0x550 [ 337.385211][T12918] ? find_held_lock+0x35/0x130 [ 337.389996][T12918] sendmsg_copy_msghdr+0x3d/0x70 [ 337.394951][T12918] ___sys_sendmsg+0xd0/0x170 [ 337.399564][T12918] ? sendmsg_copy_msghdr+0x70/0x70 [ 337.404713][T12918] ? __kasan_check_read+0x11/0x20 [ 337.409761][T12918] ? __fget+0x37f/0x550 [ 337.413946][T12918] ? do_dup2+0x4f0/0x4f0 04:18:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x571842) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 337.418221][T12918] ? __fget_light+0x1a9/0x230 [ 337.422906][T12918] ? __fdget+0x1b/0x20 [ 337.422924][T12918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.422946][T12918] __sys_sendmsg+0x105/0x1d0 [ 337.422962][T12918] ? __sys_sendmsg_sock+0xc0/0xc0 [ 337.422984][T12918] ? ksys_write+0x1cf/0x290 [ 337.433292][T12918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.433310][T12918] ? do_syscall_64+0x26/0x790 [ 337.433326][T12918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:18:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480ec03000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:35 executing program 5 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 337.433341][T12918] ? do_syscall_64+0x26/0x790 [ 337.433364][T12918] __x64_sys_sendmsg+0x78/0xb0 [ 337.442971][T12918] do_syscall_64+0xfa/0x790 [ 337.442992][T12918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.443004][T12918] RIP: 0033:0x45af49 [ 337.443020][T12918] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.443033][T12918] RSP: 002b:00007efd68cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.452970][T12918] RAX: ffffffffffffffda RBX: 00007efd68cebc90 RCX: 000000000045af49 [ 337.452980][T12918] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 337.452989][T12918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 337.452997][T12918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd68cec6d4 [ 337.453006][T12918] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800f03000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc0101282, r1) 04:18:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x9af148e81583c325, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 337.635728][T12938] FAULT_INJECTION: forcing a failure. [ 337.635728][T12938] name failslab, interval 1, probability 0, space 0, times 0 [ 337.783437][T12938] CPU: 0 PID: 12938 Comm: syz-executor.5 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 337.793387][T12938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.803460][T12938] Call Trace: [ 337.806778][T12938] dump_stack+0x197/0x210 [ 337.811133][T12938] should_fail.cold+0xa/0x10 [ 337.815751][T12938] ? setup_fault_attr+0x220/0x220 [ 337.820800][T12938] ? ___might_sleep+0x163/0x2c0 [ 337.825677][T12938] __should_failslab+0x121/0x190 [ 337.830747][T12938] should_failslab+0x9/0x14 [ 337.835278][T12938] kmem_cache_alloc_node_trace+0x274/0x750 [ 337.841111][T12938] ? _raw_spin_unlock_bh+0x2c/0x30 [ 337.846244][T12938] ? release_sock+0x156/0x1c0 [ 337.851061][T12938] __get_vm_area_node+0x12f/0x3b0 [ 337.856116][T12938] __vmalloc_node_range+0xce/0x790 [ 337.861247][T12938] ? netlink_sendmsg+0x685/0xea0 [ 337.866210][T12938] ? netlink_sendmsg+0x685/0xea0 [ 337.871175][T12938] vmalloc+0x6b/0x90 [ 337.875094][T12938] ? netlink_sendmsg+0x685/0xea0 [ 337.880069][T12938] netlink_sendmsg+0x685/0xea0 [ 337.884849][T12938] ? netlink_unicast+0x7d0/0x7d0 [ 337.889803][T12938] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 337.895363][T12938] ? apparmor_socket_sendmsg+0x2a/0x30 [ 337.900822][T12938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.907057][T12938] ? security_socket_sendmsg+0x8d/0xc0 [ 337.912509][T12938] ? netlink_unicast+0x7d0/0x7d0 [ 337.917441][T12938] sock_sendmsg+0xd7/0x130 [ 337.921856][T12938] ____sys_sendmsg+0x753/0x880 [ 337.926628][T12938] ? kernel_sendmsg+0x50/0x50 [ 337.931308][T12938] ? __fget+0x35d/0x550 [ 337.935456][T12938] ? find_held_lock+0x35/0x130 [ 337.940226][T12938] ___sys_sendmsg+0x100/0x170 [ 337.944899][T12938] ? sendmsg_copy_msghdr+0x70/0x70 [ 337.950002][T12938] ? __kasan_check_read+0x11/0x20 [ 337.955025][T12938] ? __fget+0x37f/0x550 [ 337.959179][T12938] ? do_dup2+0x4f0/0x4f0 [ 337.963450][T12938] ? __fget_light+0x1a9/0x230 [ 337.968147][T12938] ? __fdget+0x1b/0x20 [ 337.972229][T12938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.978482][T12938] __sys_sendmsg+0x105/0x1d0 [ 337.983070][T12938] ? __sys_sendmsg_sock+0xc0/0xc0 [ 337.988105][T12938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.993567][T12938] ? do_syscall_64+0x26/0x790 [ 337.998252][T12938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.004393][T12938] ? do_syscall_64+0x26/0x790 [ 338.009066][T12938] __x64_sys_sendmsg+0x78/0xb0 [ 338.013825][T12938] do_syscall_64+0xfa/0x790 [ 338.018324][T12938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.024209][T12938] RIP: 0033:0x45af49 [ 338.028095][T12938] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.047709][T12938] RSP: 002b:00007efd68cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.056116][T12938] RAX: ffffffffffffffda RBX: 00007efd68cebc90 RCX: 000000000045af49 [ 338.064089][T12938] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 338.072052][T12938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:18:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800f33000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 338.080014][T12938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd68cec6d4 [ 338.087976][T12938] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x6, 'netdevsim0\x00', {0x16864033}, 0x3f}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x1, 0x2042) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000180)="6f2ec97ab67a32b1125272865c8a32ad62f71839e53028cfbb94c1f207a60d7bbe23a0394c08f561fa4e3a0c4aca1598c9d9f317fd1bf2cddcbaf4d8cf09283f47734f04f6c77e2028479f643d2f202841d3dfdd968690") openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) r5 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r5, 0x0, 0x2000421, 0x1) write(r5, &(0x7f0000000340)='/', 0x1) sendfile(r5, r5, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r5, 0x0) r6 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r6, 0x0, 0x2000421, 0x1) write(r6, &(0x7f0000000340)='/', 0x1) sendfile(r6, r6, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r6, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$UDMABUF_CREATE_LIST(r4, 0x40087543, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000003000000ffb49cc2d21e4cab0fdd647ed09a5734d8beb326", @ANYRES32=r5, @ANYBLOB="0000000000f8ffffffffff7f00f0ffffffffffff", @ANYRES32=r6, @ANYBLOB="0000ffffff0000000000000200", @ANYRES32=r7, @ANYBLOB="0000000000000000000001000000000000000000"]) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8983, &(0x7f0000000240)={0x3, 'vlan0\x00', {0x5}, 0x4}) 04:18:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc0189436, r1) 04:18:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 5 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800000f00056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 338.599571][T12985] FAULT_INJECTION: forcing a failure. [ 338.599571][T12985] name failslab, interval 1, probability 0, space 0, times 0 04:18:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 338.701892][T12985] CPU: 1 PID: 12985 Comm: syz-executor.5 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 338.711839][T12985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.721898][T12985] Call Trace: [ 338.721923][T12985] dump_stack+0x197/0x210 [ 338.721947][T12985] should_fail.cold+0xa/0x10 [ 338.729559][T12985] ? ____sys_sendmsg+0x753/0x880 [ 338.729581][T12985] ? setup_fault_attr+0x220/0x220 [ 338.729601][T12985] ? ___might_sleep+0x163/0x2c0 [ 338.729623][T12985] __should_failslab+0x121/0x190 [ 338.753942][T12985] should_failslab+0x9/0x14 [ 338.758467][T12985] kmem_cache_alloc_node+0x268/0x740 [ 338.763770][T12985] ? ___might_sleep+0x163/0x2c0 [ 338.768667][T12985] alloc_vmap_area+0x147/0x2080 [ 338.773550][T12985] ? __get_vm_area_node+0x12f/0x3b0 [ 338.778856][T12985] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 338.784420][T12985] ? purge_vmap_area_lazy+0x40/0x40 [ 338.784436][T12985] ? _raw_spin_unlock_bh+0x2c/0x30 [ 338.784456][T12985] ? release_sock+0x156/0x1c0 [ 338.799448][T12985] __get_vm_area_node+0x17e/0x3b0 [ 338.804498][T12985] __vmalloc_node_range+0xce/0x790 [ 338.809627][T12985] ? netlink_sendmsg+0x685/0xea0 [ 338.814582][T12985] ? netlink_sendmsg+0x685/0xea0 [ 338.814604][T12985] vmalloc+0x6b/0x90 [ 338.814619][T12985] ? netlink_sendmsg+0x685/0xea0 [ 338.814639][T12985] netlink_sendmsg+0x685/0xea0 [ 338.833146][T12985] ? netlink_unicast+0x7d0/0x7d0 [ 338.838103][T12985] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 338.843674][T12985] ? apparmor_socket_sendmsg+0x2a/0x30 [ 338.849151][T12985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.855410][T12985] ? security_socket_sendmsg+0x8d/0xc0 [ 338.860891][T12985] ? netlink_unicast+0x7d0/0x7d0 [ 338.865848][T12985] sock_sendmsg+0xd7/0x130 [ 338.870289][T12985] ____sys_sendmsg+0x753/0x880 [ 338.875071][T12985] ? kernel_sendmsg+0x50/0x50 [ 338.879773][T12985] ? __fget+0x35d/0x550 [ 338.883944][T12985] ? find_held_lock+0x35/0x130 [ 338.888742][T12985] ___sys_sendmsg+0x100/0x170 [ 338.893555][T12985] ? sendmsg_copy_msghdr+0x70/0x70 [ 338.898680][T12985] ? __kasan_check_read+0x11/0x20 [ 338.903732][T12985] ? __fget+0x37f/0x550 [ 338.908018][T12985] ? do_dup2+0x4f0/0x4f0 [ 338.912280][T12985] ? __fget_light+0x1a9/0x230 [ 338.912302][T12985] ? __fdget+0x1b/0x20 [ 338.912327][T12985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 338.927383][T12985] __sys_sendmsg+0x105/0x1d0 [ 338.931997][T12985] ? __sys_sendmsg_sock+0xc0/0xc0 [ 338.937059][T12985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 338.942528][T12985] ? do_syscall_64+0x26/0x790 [ 338.947213][T12985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.953301][T12985] ? do_syscall_64+0x26/0x790 [ 338.958007][T12985] __x64_sys_sendmsg+0x78/0xb0 [ 338.962792][T12985] do_syscall_64+0xfa/0x790 [ 338.967316][T12985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.973196][T12985] RIP: 0033:0x45af49 [ 338.973213][T12985] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:18:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800023000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 338.973222][T12985] RSP: 002b:00007efd68cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.973236][T12985] RAX: ffffffffffffffda RBX: 00007efd68cebc90 RCX: 000000000045af49 [ 338.973245][T12985] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 338.973258][T12985] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.029171][T12985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd68cec6d4 [ 339.037161][T12985] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '.'}], 0xa, "6fff60f71f73c3bc75028fe937b7b25e64b3bda9dd"}, 0x22) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8000) renameat2(r2, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00', 0x2) 04:18:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc020660b, r1) 04:18:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:37 executing program 5 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 339.277214][T13012] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800033000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 339.335134][T13012] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 339.452079][T13024] FAULT_INJECTION: forcing a failure. [ 339.452079][T13024] name failslab, interval 1, probability 0, space 0, times 0 [ 339.499361][T13024] CPU: 1 PID: 13024 Comm: syz-executor.5 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 339.509326][T13024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.519395][T13024] Call Trace: [ 339.522723][T13024] dump_stack+0x197/0x210 [ 339.527084][T13024] should_fail.cold+0xa/0x10 [ 339.531696][T13024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.537957][T13024] ? setup_fault_attr+0x220/0x220 [ 339.543006][T13024] ? ___might_sleep+0x163/0x2c0 [ 339.547885][T13024] __should_failslab+0x121/0x190 [ 339.552847][T13024] should_failslab+0x9/0x14 [ 339.557369][T13024] kmem_cache_alloc_node+0x268/0x740 [ 339.562671][T13024] ? ___might_sleep+0x163/0x2c0 [ 339.567557][T13024] alloc_vmap_area+0xcb8/0x2080 [ 339.572427][T13024] ? __get_vm_area_node+0x12f/0x3b0 [ 339.577642][T13024] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 339.583256][T13024] ? purge_vmap_area_lazy+0x40/0x40 [ 339.588473][T13024] ? _raw_spin_unlock_bh+0x2c/0x30 [ 339.593603][T13024] ? release_sock+0x156/0x1c0 [ 339.598308][T13024] __get_vm_area_node+0x17e/0x3b0 [ 339.603364][T13024] __vmalloc_node_range+0xce/0x790 [ 339.608493][T13024] ? netlink_sendmsg+0x685/0xea0 [ 339.613458][T13024] ? netlink_sendmsg+0x685/0xea0 [ 339.618424][T13024] vmalloc+0x6b/0x90 [ 339.622350][T13024] ? netlink_sendmsg+0x685/0xea0 [ 339.627316][T13024] netlink_sendmsg+0x685/0xea0 [ 339.632104][T13024] ? netlink_unicast+0x7d0/0x7d0 [ 339.637057][T13024] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 339.642623][T13024] ? apparmor_socket_sendmsg+0x2a/0x30 [ 339.648086][T13024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.654333][T13024] ? security_socket_sendmsg+0x8d/0xc0 [ 339.659791][T13024] ? netlink_unicast+0x7d0/0x7d0 [ 339.664724][T13024] sock_sendmsg+0xd7/0x130 [ 339.669134][T13024] ____sys_sendmsg+0x753/0x880 [ 339.673893][T13024] ? kernel_sendmsg+0x50/0x50 [ 339.678562][T13024] ? __fget+0x35d/0x550 [ 339.682719][T13024] ? find_held_lock+0x35/0x130 [ 339.687489][T13024] ___sys_sendmsg+0x100/0x170 [ 339.692163][T13024] ? sendmsg_copy_msghdr+0x70/0x70 [ 339.697276][T13024] ? __kasan_check_read+0x11/0x20 [ 339.702305][T13024] ? __fget+0x37f/0x550 [ 339.706462][T13024] ? do_dup2+0x4f0/0x4f0 [ 339.710705][T13024] ? __fget_light+0x1a9/0x230 [ 339.715377][T13024] ? __fdget+0x1b/0x20 [ 339.719452][T13024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.725694][T13024] __sys_sendmsg+0x105/0x1d0 [ 339.730279][T13024] ? __sys_sendmsg_sock+0xc0/0xc0 [ 339.735320][T13024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.740769][T13024] ? do_syscall_64+0x26/0x790 [ 339.745438][T13024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.751492][T13024] ? do_syscall_64+0x26/0x790 [ 339.756167][T13024] __x64_sys_sendmsg+0x78/0xb0 [ 339.760923][T13024] do_syscall_64+0xfa/0x790 [ 339.765432][T13024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.771315][T13024] RIP: 0033:0x45af49 [ 339.775203][T13024] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:18:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc0481273, r1) 04:18:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil], &(0x7f00000000c0)=[0x6], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) 04:18:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800043000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 339.794795][T13024] RSP: 002b:00007efd68cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 339.803193][T13024] RAX: ffffffffffffffda RBX: 00007efd68cebc90 RCX: 000000000045af49 [ 339.811170][T13024] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 339.819149][T13024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.827124][T13024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd68cec6d4 [ 339.835094][T13024] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4000000, 0x121400) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = gettid() prlimit64(r2, 0x4, &(0x7f0000000040)={0x7fffffff, 0x4}, &(0x7f0000000080)) socket$inet(0x2, 0x0, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000a3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000050f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:37 executing program 5 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000e3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 340.323228][T13063] FAULT_INJECTION: forcing a failure. [ 340.323228][T13063] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:18:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0xc0d05640, r1) 04:18:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$SNDCTL_DSP_SETDUPLEX(r4, 0x5016, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r5 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ftruncate(r5, 0x2881) [ 340.453900][T13063] CPU: 0 PID: 13063 Comm: syz-executor.5 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 340.463875][T13063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.473943][T13063] Call Trace: [ 340.477257][T13063] dump_stack+0x197/0x210 [ 340.481615][T13063] should_fail.cold+0xa/0x10 [ 340.486232][T13063] ? setup_fault_attr+0x220/0x220 [ 340.491272][T13063] ? ___might_sleep+0x163/0x2c0 [ 340.496177][T13063] should_fail_alloc_page+0x50/0x60 04:18:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 340.501397][T13063] __alloc_pages_nodemask+0x1a1/0x910 [ 340.506786][T13063] ? vmalloc+0x6b/0x90 [ 340.510866][T13063] ? netlink_sendmsg+0x685/0xea0 [ 340.515814][T13063] ? sock_sendmsg+0xd7/0x130 [ 340.520421][T13063] ? ____sys_sendmsg+0x753/0x880 [ 340.525489][T13063] ? __alloc_pages_slowpath+0x2900/0x2900 [ 340.531227][T13063] ? perf_trace_lock+0xeb/0x4c0 [ 340.536101][T13063] ? mark_lock+0xc2/0x1220 [ 340.540639][T13063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.546892][T13063] ? debug_smp_processor_id+0x33/0x18a [ 340.546910][T13063] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 340.546931][T13063] alloc_pages_current+0x107/0x210 [ 340.546953][T13063] __get_free_pages+0xc/0x40 [ 340.546970][T13063] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 340.546996][T13063] __apply_to_page_range+0x6a1/0xab0 [ 340.579284][T13063] ? memset+0x40/0x40 [ 340.583267][T13063] ? memset+0x40/0x40 [ 340.587240][T13063] apply_to_page_range+0x3b/0x50 [ 340.592172][T13063] kasan_populate_vmalloc+0x66/0x70 [ 340.597365][T13063] alloc_vmap_area+0xc26/0x2080 [ 340.602232][T13063] ? purge_vmap_area_lazy+0x40/0x40 [ 340.607420][T13063] ? _raw_spin_unlock_bh+0x2c/0x30 [ 340.612526][T13063] ? release_sock+0x156/0x1c0 [ 340.617213][T13063] __get_vm_area_node+0x17e/0x3b0 [ 340.622248][T13063] __vmalloc_node_range+0xce/0x790 [ 340.627350][T13063] ? netlink_sendmsg+0x685/0xea0 [ 340.632286][T13063] ? netlink_sendmsg+0x685/0xea0 [ 340.637239][T13063] vmalloc+0x6b/0x90 [ 340.641128][T13063] ? netlink_sendmsg+0x685/0xea0 [ 340.646059][T13063] netlink_sendmsg+0x685/0xea0 [ 340.650826][T13063] ? netlink_unicast+0x7d0/0x7d0 [ 340.655757][T13063] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 340.661299][T13063] ? apparmor_socket_sendmsg+0x2a/0x30 [ 340.666768][T13063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.673002][T13063] ? security_socket_sendmsg+0x8d/0xc0 [ 340.678470][T13063] ? netlink_unicast+0x7d0/0x7d0 [ 340.683403][T13063] sock_sendmsg+0xd7/0x130 [ 340.687816][T13063] ____sys_sendmsg+0x753/0x880 [ 340.692587][T13063] ? kernel_sendmsg+0x50/0x50 [ 340.697258][T13063] ? __fget+0x35d/0x550 [ 340.701404][T13063] ? find_held_lock+0x35/0x130 [ 340.706176][T13063] ___sys_sendmsg+0x100/0x170 [ 340.710847][T13063] ? sendmsg_copy_msghdr+0x70/0x70 [ 340.715949][T13063] ? __kasan_check_read+0x11/0x20 [ 340.720980][T13063] ? __fget+0x37f/0x550 [ 340.725149][T13063] ? do_dup2+0x4f0/0x4f0 [ 340.729396][T13063] ? __fget_light+0x1a9/0x230 [ 340.734077][T13063] ? __fdget+0x1b/0x20 [ 340.738140][T13063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.744388][T13063] __sys_sendmsg+0x105/0x1d0 [ 340.748970][T13063] ? __sys_sendmsg_sock+0xc0/0xc0 [ 340.754002][T13063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.759456][T13063] ? do_syscall_64+0x26/0x790 [ 340.764123][T13063] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.770180][T13063] ? do_syscall_64+0x26/0x790 [ 340.774868][T13063] __x64_sys_sendmsg+0x78/0xb0 [ 340.779628][T13063] do_syscall_64+0xfa/0x790 [ 340.784127][T13063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.790008][T13063] RIP: 0033:0x45af49 [ 340.793894][T13063] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.813489][T13063] RSP: 002b:00007efd68cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 340.821888][T13063] RAX: ffffffffffffffda RBX: 00007efd68cebc90 RCX: 000000000045af49 [ 340.829857][T13063] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 340.837821][T13063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 340.845791][T13063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd68cec6d4 04:18:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000f3000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 340.853756][T13063] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 04:18:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 340.979033][T13063] warn_alloc: 2 callbacks suppressed [ 340.979054][T13063] syz-executor.5: vmalloc: allocation failure: 213312 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 340.999882][T13063] CPU: 0 PID: 13063 Comm: syz-executor.5 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 341.009805][T13063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.019873][T13063] Call Trace: [ 341.023184][T13063] dump_stack+0x197/0x210 04:18:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 341.027530][T13063] warn_alloc.cold+0x87/0x164 [ 341.032221][T13063] ? zone_watermark_ok_safe+0x260/0x260 [ 341.037775][T13063] ? kfree+0x226/0x2c0 [ 341.039355][T13082] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 341.041862][T13063] ? trace_hardirqs_on+0x67/0x240 [ 341.041881][T13063] ? __get_vm_area_node+0x317/0x3b0 [ 341.041904][T13063] ? __get_vm_area_node+0x2e7/0x3b0 [ 341.041932][T13063] __vmalloc_node_range+0x44c/0x790 [ 341.041960][T13063] ? netlink_sendmsg+0x685/0xea0 [ 341.041978][T13063] vmalloc+0x6b/0x90 [ 341.042001][T13063] ? netlink_sendmsg+0x685/0xea0 [ 341.083701][T13063] netlink_sendmsg+0x685/0xea0 [ 341.088471][T13063] ? netlink_unicast+0x7d0/0x7d0 [ 341.093410][T13063] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 341.098970][T13063] ? apparmor_socket_sendmsg+0x2a/0x30 [ 341.104483][T13063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.110715][T13063] ? security_socket_sendmsg+0x8d/0xc0 [ 341.116177][T13063] ? netlink_unicast+0x7d0/0x7d0 [ 341.121116][T13063] sock_sendmsg+0xd7/0x130 [ 341.125571][T13063] ____sys_sendmsg+0x753/0x880 [ 341.130323][T13063] ? kernel_sendmsg+0x50/0x50 [ 341.134999][T13063] ? __fget+0x35d/0x550 [ 341.139153][T13063] ? find_held_lock+0x35/0x130 [ 341.144705][T13063] ___sys_sendmsg+0x100/0x170 [ 341.149424][T13063] ? sendmsg_copy_msghdr+0x70/0x70 [ 341.154546][T13063] ? __kasan_check_read+0x11/0x20 [ 341.159597][T13063] ? __fget+0x37f/0x550 [ 341.163770][T13063] ? do_dup2+0x4f0/0x4f0 [ 341.168019][T13063] ? __fget_light+0x1a9/0x230 [ 341.172708][T13063] ? __fdget+0x1b/0x20 [ 341.176799][T13063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.183068][T13063] __sys_sendmsg+0x105/0x1d0 [ 341.187709][T13063] ? __sys_sendmsg_sock+0xc0/0xc0 [ 341.192767][T13063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.198239][T13063] ? do_syscall_64+0x26/0x790 [ 341.202928][T13063] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.208990][T13063] ? do_syscall_64+0x26/0x790 [ 341.213691][T13063] __x64_sys_sendmsg+0x78/0xb0 [ 341.218474][T13063] do_syscall_64+0xfa/0x790 [ 341.222994][T13063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.228880][T13063] RIP: 0033:0x45af49 [ 341.232770][T13063] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.252487][T13063] RSP: 002b:00007efd68cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 341.260914][T13063] RAX: ffffffffffffffda RBX: 00007efd68cebc90 RCX: 000000000045af49 [ 341.268881][T13063] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 341.276850][T13063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 341.284842][T13063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd68cec6d4 [ 341.292823][T13063] R13: 00000000004ca97a R14: 00000000004e3db8 R15: 0000000000000004 [ 341.307065][T13063] Mem-Info: [ 341.310330][T13063] active_anon:179299 inactive_anon:229 isolated_anon:0 [ 341.310330][T13063] active_file:7693 inactive_file:42153 isolated_file:0 [ 341.310330][T13063] unevictable:0 dirty:140 writeback:0 unstable:0 [ 341.310330][T13063] slab_reclaimable:14368 slab_unreclaimable:95676 [ 341.310330][T13063] mapped:60215 shmem:301 pagetables:1150 bounce:0 [ 341.310330][T13063] free:1177405 free_pcp:445 free_cma:0 [ 341.348935][T13063] Node 0 active_anon:717196kB inactive_anon:916kB active_file:30632kB inactive_file:168612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:240860kB dirty:556kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 647168kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 341.378081][T13063] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:18:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 341.513457][T13082] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 341.520696][T13063] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 341.564875][T13063] lowmem_reserve[]: 0 2532 2532 2532 2532 [ 341.578725][T13063] Node 0 DMA32 free:930088kB min:36068kB low:45084kB high:54100kB reserved_highatomic:0KB active_anon:714972kB inactive_anon:916kB active_file:30632kB inactive_file:168612kB unevictable:0kB writepending:556kB present:3129332kB managed:2596496kB mlocked:0kB kernel_stack:7708kB pagetables:4596kB bounce:0kB free_pcp:1952kB local_pcp:848kB free_cma:0kB [ 341.615721][T13063] lowmem_reserve[]: 0 0 0 0 0 [ 341.620466][T13063] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 341.690390][T13063] lowmem_reserve[]: 0 0 0 0 0 [ 341.722244][T13063] Node 1 Normal free:3766312kB min:53820kB low:67272kB high:80724kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 341.791321][T13063] lowmem_reserve[]: 0 0 0 0 0 [ 341.796186][T13063] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 341.880163][T13063] Node 0 DMA32: 10964*4kB (UME) 157*8kB (UME) 470*16kB (UME) 645*32kB (UM) 254*64kB (UM) 72*128kB (UE) 15*256kB (UE) 5*512kB (UME) 3*1024kB (UME) 1*2048kB (M) 201*4096kB (M) = 933560kB [ 341.900157][T13063] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 341.913366][T13063] Node 1 Normal: 20*4kB (UM) 127*8kB (UME) 194*16kB (UME) 76*32kB (UME) 35*64kB (UM) 19*128kB (UME) 8*256kB (U) 4*512kB (UE) 3*1024kB (UME) 2*2048kB (ME) 914*4096kB (M) = 3766312kB [ 341.932123][T13063] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 341.941685][T13063] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 341.951726][T13063] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 341.961427][T13063] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 341.970847][T13063] 47115 total pagecache pages [ 341.976366][T13063] 0 pages in swap cache 04:18:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800603000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_settime(0x7, &(0x7f00000000c0)={r1, r2+10000000}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 04:18:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x975, 0x1}, 0x402, 0x0, 0x2, 0x2, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r1 = dup(r0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) r4 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x4d3, 0x0) ioctl$VIDIOC_DQBUF(r4, 0xc040564a, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "41509547"}}) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f0000000140)={0xa, {0x9, 0x2, 0x101, 0x40}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 04:18:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 341.980517][T13063] Swap cache stats: add 0, delete 0, find 0/0 [ 341.986658][T13063] Free swap = 0kB [ 341.990471][T13063] Total swap = 0kB [ 341.994263][T13063] 1965979 pages RAM [ 341.998064][T13063] 0 pages HighMem/MovableOnly [ 342.002821][T13063] 345328 pages reserved [ 342.006971][T13063] 0 pages cma reserved [ 342.104068][T13122] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xc8, r2, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xb4, 0xc, [{0x24, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x70416b7c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf28c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d5c540c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32bae7f2}]}, {0x3c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x604bef2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d64772f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1ead}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x27f6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf63b}]}, {0x3c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa96}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf0db378}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5504c361}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3bd1bab5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6456}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb0a4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x13d8a14d}]}, {0x14, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c859baf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7fb0a864}]}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x14000080}, 0x40081) 04:18:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800f33000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="0f0000003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x81, 0x743403) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="140000003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003500056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x7fff, 0xffffffffffff7fff, 0xffffffff}) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000240)={0x0, 0x1}) ioctl$FBIOPUTCMAP(r2, 0x4605, &(0x7f0000000140)={0x9, 0x2, &(0x7f0000000040)=[0x1, 0x1f], &(0x7f0000000080)=[0x80], &(0x7f00000000c0)=[0x1, 0x8, 0x3, 0x3f, 0x3, 0x3ff, 0x101, 0xfff], &(0x7f0000000100)=[0xfe, 0x20, 0xfff, 0xec00]}) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000200)={0xa10000, 0x3, 0x8, r4, 0x0, &(0x7f00000001c0)={0xa10901, 0x8001, [], @p_u8=&(0x7f0000000180)=0x3}}) 04:18:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 342.602652][T13146] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003f00056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="354800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 342.676214][T13146] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 342.724653][T13153] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}, 0x20402, 0x0, 0x2, 0x0, 0x5, 0x1}, 0x0, 0x20, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000040)={@rand_addr, @remote}, &(0x7f0000000080)=0xc) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:18:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480001b100056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:40 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000006000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'veth0_to_bond\x00', {0x2, 0x4e23, @multicast2}}) socket$caif_seqpacket(0x25, 0x5, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x53, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x200}, 0x402, 0x0, 0x2, 0x6, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:18:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 343.189347][T13192] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 343.197408][T13194] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2eb101003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800000f00056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 343.304320][T13194] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x9d0000, 0xfffffffc, 0x6, r2, 0x0, &(0x7f0000000080)={0x990a74, 0x1000, [], @p_u8=&(0x7f0000000040)=0x81}}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000100)={0x2, 0x6, 0x1, 0x5, '\x00', 0x9}) 04:18:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000140)=0x3f83c024) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x4}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) [ 343.516533][T13216] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4802003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003500056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 343.592010][T13220] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x200, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x644}, 0x8, 0x800) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r6 = socket(0xa, 0x2, 0x0) r7 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[r7, r8, r0, r9]}, 0x4) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r6) 04:18:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 343.759618][T13225] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4803003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000b101056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000140)=""/139) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003002056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x2, 0x8040) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f0000000180)={0x1000, 0x8, [0x8, 0x7]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) flock(r0, 0x8) mq_timedreceive(0xffffffffffffffff, &(0x7f00000001c0)=""/32, 0x20, 0x0, &(0x7f0000000240)={r6, r7+10000000}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f00000000c0)={0x1, 0x4}, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000280)={0xeba, 0x4a1b, 0x20000, 0x7f, 0x8563}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x21d) 04:18:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4804003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x3, 0x34ac02) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480a003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003003056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480e003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x68c7b402b97198bd) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x800, 0x3, 0x9, 0x4, 0x2], 0x5, 0x0, 0x1, 0x8, 0xffffffff, 0x2, 0x8, {0x2d95f631, 0x3b4a, 0xffff, 0x93a, 0x9, 0x80, 0x8, 0x7, 0x9, 0x200, 0x4, 0x6, 0x44830652, 0x7, "954dcc0f7ada492f56d86ae20b7f18e20b317afddcf1598d0d04e467783b5aee"}}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000051e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003004056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480f003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffffde) 04:18:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000300a056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4860003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x514002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0}, 0x402, 0xffffffffffffffff, 0x2, 0x9, 0x5}, 0x0, 0x0, r0, 0x2) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0xfffffffffffffe71, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:18:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x400, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000300e056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48f0003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7ff, 0x101000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) socket$inet6_sctp(0xa, 0x5, 0x84) 04:18:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000300f056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e482e013000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x103003, 0x1) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x5, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000180), r4, 0x0, 0x2, 0x4}}, 0x20) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30d3, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r5 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) 04:18:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48ca013000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003060056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800033000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000030f3056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x80000000, 0x83c00) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x7) 04:18:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x242008}, 0x1be, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="980000000104020025bd7000fbdbdf250a00000606000640000300007f00064000000000080004400000ffff080003400000008108000540ff000000080004400000000308000440000000040a000200000000020300000008000440fffffffd060007000000000006000640000200000800f6bc2a3be50920a1ac0b4bd1b40440000007ff0800034000000800050001000400000005000100010000000600064000020000"], 0x98}, 0x1, 0x0, 0x0, 0x8}, 0x20000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:18:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000a3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) 04:18:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000030000c6bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x6cdbb3c8383c7d53, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffffffe, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000e3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x100000003, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000126bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000000)='./file0/file1\x00', 0x0) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, r3) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r6, 0xc02c5341, &(0x7f00000001c0)) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x88100, 0x0) ioctl$UFFDIO_ZEROPAGE(r7, 0xc020aa04, &(0x7f0000000180)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}}) 04:18:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x1, 0x0) openat$cgroup_ro(r3, &(0x7f0000000a80)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000580)={0x0, 0xd44, 0x5aa1, 0x4, 0x80000001, 0x4}, &(0x7f00000005c0)=0x14) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r4 = socket(0xa, 0x2, 0x0) getrlimit(0x7, &(0x7f0000000080)) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000300000000000000007700000000000005000000900300000000000078010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$SNDCTL_DSP_GETODELAY(r2, 0x80045017, &(0x7f0000000600)) r5 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$EBT_SO_GET_INFO(r5, 0x0, 0x80, &(0x7f0000000ac0)={'filter\x00'}, &(0x7f0000000b40)=0x78) write$binfmt_elf64(r4, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0xcd, 0x3, 0x0, 0x9, 0xff, 0x2, 0x6, 0x2, 0x24b, 0x40, 0x3c2, 0x8, 0x5, 0x38, 0x2, 0x4, 0x1000, 0x7}, [{0x6474e551, 0x2, 0x7, 0x79, 0x101, 0x6, 0xd0, 0x3}, {0x4, 0x5, 0x9, 0x401, 0x1, 0x7fff, 0x7ff, 0x4}], "01d112a9166396c00b4c9b4e9aa9b3a5304d9a828c43c35f0c81a0339f1e590088795bd56833a52c3deb944deb22381a0ad2dff4d08a32c8b1ac185f7d25e8d934420768897c84b07ab9ba91e31e6bca89a0fa1f64ed0cd485959642c121cf72e0eb443561fa5830743f262d154b6f0a87c88fabb34771a085666b540f47a371e56470829e541396c2abafd5750677972ba80c2f372620ef28fec36fd4c4b18dcdbb26df3067d03fb4eb8c24f9493c36f24f05390ab89853231e838f6ced3cb9c46deba059eb7dbcff65a9ee7215afd1f11593513378bd4b7dc8c1acfaff2d8590fddaba78e5e534f67bd6b7ececc85d6b3d85297f", [[], [], []]}, 0x4a5) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) 04:18:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48c00e3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000356bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 347.314253][T13474] xt_check_match: 13 callbacks suppressed [ 347.314265][T13474] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000f3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 347.381527][T13479] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 347.456307][T13474] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000406bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 347.506663][T13479] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="20d47f3d85c2808ac8ca7c546d19090edbcd492ee2910a9dfabe19271055ab276473f631e2577e45e86d3c6f7d43aef8359fad0d54d8eda8a9a56ae6e65f77fdea06ae06b0b0f65163dfb06e", 0x4c, 0xfffffffffffffffb) keyctl$link(0x8, r0, 0xfffffffffffffff8) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x2000, 0x0) 04:18:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48012e3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x67, 0x800, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) socket(0x9, 0x6, 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000180)=0x2e8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040)={r3, @in={{0x2, 0x4e21, @rand_addr=0x8}}}, 0x84) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r4) 04:18:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48003f3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003001b16bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 04:18:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = semget$private(0x0, 0x207, 0x0) semop(r2, 0x0, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000100)=""/40) semop(r2, &(0x7f0000000140)=[{0x1, 0x4, 0x800}, {0x4, 0x4, 0x1400}, {0x3, 0x5}, {0x1, 0x4, 0x1000}, {0x7, 0x7, 0x2000}], 0x5) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 348.092678][T13525] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000030000c6bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800403000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800603000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 348.315047][T13525] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137353e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$fb(r1, &(0x7f0000000080)="bc32bcfb52e997d8a3a38b5d38fc7616a4a347760c67ad9e7875331efbd697a792daa9e7a71f4dd51923870ac47aa47deac04a4d7f5a07df14dbd23db668a18a44cd97e763edf2201429c2b10d1057fed3fe39cae1a92fb759c75732d1d1d04b40cecb7d1b1dadabeb9597267945e608772d82da7b9686e5165f8a5ceb", 0x7d) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000c0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000140)={r5, 0x3, 0x401}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e24, 0x1000, @rand_addr="91ae0aaf459d86d5b6109a197d5207fa", 0x4}}, 0x5, 0x1, 0xffffffff, 0x40000, 0x4}, &(0x7f0000000280)=0x98) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0xb16f5f77375b3e73) 04:18:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480ec03000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e373507088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x1, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000126bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370908088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4801ca3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 348.737775][T13569] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000052f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000356bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x8001, 0x10400) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000240)="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", 0x127}, {&(0x7f0000000100)="10af3bdf44e6e4eee1d5a86be141eb16fb0ed6f0a39135da30cbc2608447f4fab3ee269abdc43e72c12fef9ce67df2843bce8b899c917b3990553af3f38cb4267c954eac088ccfd50944c1f0d63ee4f25b69a15254c08e26f52fe5852729beffd2f725155d7d366140e6c35ab676b02675e77062fee27d11fe6197ff3d3ec88ecbc515320a7c22a96acb7dde8f6ee54601e45bd1d632bedc76115ca6c5110b55ad17c3b2c0d345be01bb15fffea9f71d365695e5cfbd11aa5cfa", 0xba}], 0x2) 04:18:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000140), 0xfffffffffffffef3, 0xfffffffffffffffa) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xd, 0x4, &(0x7f00000008c0)=@framed={{}, [@jmp={0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x21}]}, &(0x7f0000000900)='syzkaller\x00', 0x1, 0xf6, &(0x7f0000000000)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:18:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370910088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800f03000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630c400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370912088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800000f00056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18, 0xf, 0x2, {{0x40, 0x0, 0x3}}}, 0xe) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40000, 0x0) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)) 04:18:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c6312400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370935088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x0, 0x1000, 0x0, r0, 0x0, &(0x7f0000000080)={0x9909ce, 0xecd, [], @p_u32=&(0x7f0000000040)=0x8}}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x3, 0x1, 0x200, 0x70bd2b, 0x25dfdbfe, {0x6, 0x0, 0x2}, [@CTA_TIMEOUT={0x8, 0x7, 0x6}, @CTA_PROTOINFO={0x38, 0x4, @CTA_PROTOINFO_TCP={0x34, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x6}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x80, 0x4c}}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x5}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x20}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x1b}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40010}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 04:18:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800023000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c6335400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x800000, 0xffffffffffffffff, 0x1) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 349.772929][T13636] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 349.831004][T13636] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907028000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800033000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a020c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000000c0)=0xfffffffffffffe62, 0x800) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0100000001000000b75d4ac6975fde1c1a9fef"}) ioctl$TCSETX(r3, 0x5433, &(0x7f0000000100)={0x0, 0xff, [0x48, 0x5, 0xfffa, 0x6, 0x4], 0x6}) 04:18:47 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) accept$nfc_llcp(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x60) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 04:18:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907038000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800043000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 350.278468][T13672] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 350.303252][T13670] sp0: Synchronizing with TNC 04:18:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000a3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a030c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 350.354954][T13662] [U] è 04:18:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907048000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) r4 = openat(r3, &(0x7f0000000140)='./file0\x00', 0x800, 0xc2) ioctl$SG_SET_DEBUG(r4, 0x227e, &(0x7f0000000180)=0x1) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000001c0)) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) [ 350.620948][T13670] sp0: Synchronizing with TNC 04:18:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a040c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 350.655120][T13662] [U] è 04:18:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000e3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x1, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x5, 0x1, &(0x7f0000000080)=0x81}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r3 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x4d3, 0x0) ioctl$VIDIOC_DQBUF(r3, 0xc040564a, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "41509547"}}) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000180)={0x9c0000, 0x81, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x9a0913, 0x3, [], @string=&(0x7f0000000100)=0x5}}) 04:18:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907058000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137353e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000f3000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a050c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907068000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800603000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e373507088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[], 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x34}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x75f447ee1ba918bd}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x67}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2a}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8}, 0x20800) splice(r2, &(0x7f0000000040)=0x46, r0, &(0x7f0000000080)=0x9, 0x7, 0x4) 04:18:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a060c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYRES64=0x0], 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x300, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x520208}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8000}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x8) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000140)=0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 04:18:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907078000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003500056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370908088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a070c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r1, 0x7}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x8000, 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040)="941804914e36cd8b66710b6b17fc9b2eccdee651db5ce5", 0x29806c5fa86ed4a, 0x1, 0x0, 0x266) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) geteuid() 04:18:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400000, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000180)=0x3a34) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) [ 352.076379][T13770] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:18:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003f00056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370910088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e3709070c8000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a080c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) rt_sigqueueinfo(r0, 0x2c, &(0x7f0000000280)={0x2b, 0xfffff000, 0x7fff}) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000140)={0x2, 0xe32, 0x3f, 0x3, 0xffc00000, 0x1}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 04:18:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480001b100056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370912088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a090c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907358000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800000f00056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000ec0)=ANY=[@ANYPTR=&(0x7f0000000e80)=ANY=[@ANYRES16]], 0x1) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000cc0)="353b89c75bb6ace7c95e5d921313eb4002e587ea2784ac89f8d35e4b30941f22e45038b6dffee61b0859830379d059c0eeaa22bab36946ab6b38b866ffd005fcaa4dae2ad5c1a69b7325d92fe5a8d9de8a9f7f3e96eabd9e409c68453eb7bdd445be7c6c375702b90a91a5fcc23a4653fb4fca382c2a037380b0b79905f689d5a009e7503d9cb1fc897ec1acca26af95e4efc373a1219b122d798b4affbb6d959684cc0293441c471dd41b5a22147983c725861cfcfc3eab67c5") r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0xa00, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0xa, &(0x7f0000000b40)=[{&(0x7f0000000240)="06ad849c7d3be8edc24bc901b49e40916d984ace920a92c1040790d8961dfe2246254f193cd7b8db356be213f95535aebf8c141287ea1cb94045a24e3ea1743a17cd5cb06eb0341af3196dc9e93a11abd426d5fe1873a10031575d6e7f627dcc7d681e2f73c3b5", 0x67, 0x200}, {&(0x7f0000001280)="d5537d733a2b0966138c6c4a0d477c3905768a9f5e86a1228e38be900ffe5dd4d5cd0941c1d3ca4e0f4ebf761ba78d4768f0e2f6201f94e2d6570088cb93ece28aa24ec79745272632e3ba7352869ff3057a2177e348b7a057a52349db94cbeec517706b584b57d85b7f4b139e083fac49570154502c7a4c9bd7a2bb0e0c3db161d4c5cf716f4994a12210bf47114d0ed50bafa8ae5977142ae63f83054ba820869a350d17bcfcb7abdc2d636a03ea569e10f16b6ba615a687243c5d9c8dfd3a5a7cca8f660ea9d99842a1f0d5f87d92fe8f2676826a5b7ed7e35aceb6a6c7d759ff47a01fb7cb012f14b8af2a49bf1ac984d2c60bc60e55df6d8562292e810431087a5634246911ddd76a90e517924f313f912dc959c9349f7f94b8da364c9abeaf49da4d219481f584b765815d74e7a01f083e7af845f21c65505c744fb1b0f03f3621ea6aa3d586c554739ab9590f334f795cabfe888cb050ffe3c6534fb88a941df07167ecdbb501ba2218843e510d2e0608421ccc2b8d774a94cee893a8547b3871951150a4da872af30b11935963594d72cf64c538aad9370674cb1c005108073cc7e50301b40d955d7473da1d3e1f72362e00fa8b096238bcac720972bfc0bbfcee7dc01eb8f52ec09d420bcd6333d23ad011fe1f51bf097b2b64ea4f486d3811e40aa3c0d4fb257c5d9c0ecd85de9bc4db08a58e4df8166c4e6bda2db2145265d09d88125c6f451b802850c7298122b72dec009e7cc0ea64e51ac652db46511817e6130a7a41ced2594f7064671a5fb78b813b889b634ea0a09309490e761d20b21bf9764a79d4d0bef11c2f180f6ea9e4a0904229f052700745c22e62b1c2b487b5659c191d9a0d2a438c552f14347b7612897a147492c9217658131f166fc7dc0d6adc7a4ced653c5c30fb99377258902af426fcda0ff587f8f41efbb221e4b7f78bf71b644c898c13be227b7380ea857f865ba6d75671f13f61a035af8bcb8185d9550b5476d6c5ec1f53cac0140b2968ca5cf55bb03dccdbf36da1290244aa19a6a041617f518c7973c05af716e66a5b1ecea6147f2bc805bd9568baebb381d7bf506b7b5b817038c2793da47fbe0ce5440f3798cce2a87d62aa44f41188c5d6c698e11eb0c05d63acc5e102bcd4837364ebedd40f84792027ca63afbb7f6f57836b9d541278ea5fadd3cde03c29e7c170d8e4cfdcfefe40f64d379365a3ce4eb16d19948037889a94f46ef3de8c0d51ea041badd6754377dd4b0478ef829d0b947fffcbd91426955df8332755e9c021ff8742caa962b4ee0c203acf585cc234007beb504eaaafe007286d750ecde33f833c481b4713dcdccc48b69863f151715b3b5d61fa6ef52f906fce3bb7cde74eb167cc55e944bf589473cf0231aa1d790da4e31f4ebc4f603457c7ef9bd2a96f5150797868f31ca97ac4c86134ddcc6e5cd2db3c71f39fa223fbb5daf11ab47b63c8b3a33708f37aab8139f8a16d3ccd04fd0466586a24b44bc6dd172fe19ac4f51757ea99dc2447b2f5321a13a0de273339e713516d2187eeaca8ff73978714e5d163b3c060e4c58c60e720450cc770d3cd472aea5d264f081fce5a4b938fceed2e2e04f966514fec703abf0cf672215b6446e9802fc4b4db456664307a03d9932fe24d6c7aa730de6b6e51480705b9984901179a6754d01d2530a9793dfd53762a6b3dc155f0720f69d93029968349db9d5ae22972566931fb5deb14da04dbec6fb0ef2a1be54d43af863e0393db522b2bb4babb26a1ef542eab425ac2d5129f0a7ff315d5b4437e3009e8d453c935676db4c601f506dacbf538484bb95d52ca03aa32ad6332014258aa40a6739f8dd16e1d2979fcf412cd75414e04cad60629f958b5a325461822edefe05cd9fa40643679d63c265597070dec49007efcfdf5da4e663e1972de1c566793b2f46e4765504cbf343199a63fca0466de52f20b800b65140c93da89fa4d14dfe211695666ce4cdec556c9fe14cd72f7939069d70c4838566dfa50eb7e3ef421e39fd287443084f5c656d95503ab4caa7a30c876927c19de1599a84a1e55b9954c478caec190beec754aef84667d5db7bd37e76d4ef64b30576ce933b436734c6db2e5985aeb3a890451b1424576d7db28c3b5dad96df55d1d7014ad108ffd049e1df6d68d8a5acd9ec5b6bb6ceca617b6b7924d72af88fcd9ded1d323828e9b399d2bb88e2764a5a1a293c2701194620d8dc250f49dc4076e395589869d7873f92143e4ab0c19a771f2867b6fe9dc8ab205484c90deafe1ca58d0cf5ccf6e2126cdec58d0d117c05addbb96d9d13159ad666fd21019f383c828ab452879c3a5d41b1ff6098571be7f3148264fd86443c17dd55f6dbeb9e6bbe99d7cf347e8859872b79d10f45c89c38e813f98263e67b86bb4b759a8e44555aa1c66b5eacc92b742a09c43d9a6043b3be8b06aedaf0428dc1579ddef94b752c699dcf5a13d69ad305942d194e0cb601c21c5781a9aa3c7718b78c83c38a603ab8190aeb4c71fe32d7d4e24db848fc5714031d3403876419b706d00f9c81c228e37c525451dd0ae39016eeacc91b16e304803ce806ea2753d7817273e178fc186f0d672f64f98f6e8dfed7ba8587f2d0f28a9b832dfd336cf33e2ee2aff2e7d253605ac78d2b0dd7b3bb0b945a4b1d6d1339cc49517badb841fb65c7a03c4238cdefeee8411d7cc4df441412e436d80bd3a78bb6ac7c770aa2148f0623a15e4c6496a133eb8c11dbcbd3996e795f50c1081a589e090e803946fad775e5a9aa3366c9e96ffbaf05b27b21a08a5681976ef515b31ba51aae4aa4e21a8a9eeb39816c5e2fd7ecd921592327b4829ce590e1cc5adaa6798d0fa1707668b0aea4dc6b0079f036d3c7e439af9cfa94c31fffddd01843cfb5f424faca40fca3eb99a296dbc5f868cd685becd4a32fdbfe53d6612139e4383fdda0895a74f6535fde91e5864fd3942cddb545bd5d30362c81be072c9364d49d2785babc3b95b710575ef41bd3838b5367ef02ca5c16d48f79df433e0a2f15290886870c8ad5f42417e90a8a4561e53305157073caedec020a567b64f4e1083e61f658e9ee8de0535b2a6d547c11633ddc1e8b38ecd540909ab086a41b954efc96bc765084e1745c85f4edce0de74f702b7b6efed3f7f8f1fb5775fcc4670c7596857cbf9c333fb293041213579d4f46025c503a057a61a686ee4e03c14bb62c28e0febf1a03a010f8943ab98b8f492ec3143b1b4185ae794aedc47ef9fc641d4f4e9f85252788d9187a91a44b66f088e1785f048e8e97142f4d6111e264c3591fe62d347272192763704ffee083f80edab0b61d879e345015d05401ddd17d4e6954ce0d49e0f3b09ccc7610278ea1569b5a6d9fae895df01cbe730739179712c771a6199a6ba35641a2c2bf906e80f223ec269deb37af1f4afaed8ac73d78cf5a68ed01e64ecf650e12b578dc245601bdd08457c1a91378563c1ce7efff3f60614911c957df7543786d03f6fed3126a0a7e70215c294bcf79f308178a5738cb2dd3bd5a649ba83534241565ebbcb829f25b54b0c3bf17769aaee7c9af0e39cbbd0d0e74c90b9e02f4c342e4b4f527424df4acd248787cff61c9ac4512199857befc5b25f2c77b58237e449e6859f8032301c9c125af8e0a60877fa767571c0b372c1d311f192d825da0b9bf41ba519c7a791954f8f51efeb8453c9ad996fd751e7c213c76383ce92c70e0de0204a5452292f45b07deb413a07a9c8e63f734a58b8614ae9c5274e7a2a38a38ff91e4ff6eb45649397659f72cb2c3fc93c89e5ea2ad469b843e877da130712d5e5b5a4684a0164a321c6b5113054f58edb0b17d87789ccffd78b96ac74a47f07b7b52974f74137de03c6eff22cbab1e1613fc2ae0817b0b07505d53a8748d4d797f8a3dd0ae57783850ada28bbf990a56e3eb2a205b45333eb4127290f7f353db023c15ea4835fb4a19ac28c38b675e79f3f1cdfeb45531c3ccd502e44f97aa3c6199b3c31dfb3f2debb966afa97b090574df8e989fc166046562211e829ac734b69d2e67876622ab70bfa4709bb47afaf7e68a8d7928335899061792f30eb82a22b5b099499772b214b187c6f0ffeaca6621e493c218198280b7dc9e421ed7f55470161dda9aa33d3366943503c56cadc2faf4e59be8c8cb529dcd777ca1b4709bd7691f58cace29c88ead4e05325f0edba9b3ab52ad502b35dcf81d992576d78f074cd7e5183b594b68d6293a517108028e2a18f58dbdd98382a091e58b3b7ca7062017172f5632a66fa85e960f448af24ee4a6cda03dc707b5abc54138752eace5a8faa4b306dc422c68aebdefe3431a729d5f0c019dcacf5d2495c77266319c5dfc3c7ee5b16b0f8c4f05fc6721f1652cb79770685fdad610fd9ab50f56b5bd9ed1e9ed4095152bdbfccff64c49c57e724a2b660c3f3e4983b467b3806970223a248f2a4b60bbd59877d13f4810d1b27a64bce47f8a3a3d6cd4f61b8f6844b27954f65d934dc9008b28540df9762f116fa7423b0ba9bc5ab5b444eeb307270f6f656dfee0e1bdda415602b4077b5b7e10f5d53085310666b1bb1e3ed33453a420dc56afada53edf498d62aa27996e1c3492d2fc83a48dce331b79a3635112fd01fcde7f4ec724238abf6365e22f041b05a8dd5da2b394ca1400d8dfc36dafd538d384bd07e25a2268c8b1049a1625e02a6d218774a07f95bcf3b2f6be6b5e95b1c2016279e1ca29be8fe030e5987a2dc74e8da779ed01c85334c38339e0a18ba30d55eef8a0b08888acad23cf563aa0d7bf3d2f208f49279e7cf4c34a275c01846c8261515648da72473fdf120a6d61e038d8d46c0f3d80e88cc768e974726b763d82a823ad75e3a41c7e612484dd144101e4b7b397a32b21a9aaeed52e2ccc3fc73eb85db72a6bff265ff969be0f0d89ecde8622498ac3e1d449117c31ae012eaa4f7ca34755b7ee78ac1e199daa8598b49e7ec93035e6abd7df81822cedde32526d6d9fb0e7e462681f3f1011140de1e788b7380a19b1e0f22c052a62baeb8414f1982bdc7c236762061b2ec2494998e426321d3318372a7661e67b71a53d3d024239c2cdebe86bd62e0467b67ddcbfdab79f1043755cda50756b7c623f705dde55ad0dbc836160b1cac2d7c4d2e06049cb062cbfb866344dede5a8fe032059d263e035fcd175803d2ae4a69d41ce9ee368940f2c2595ff081eb24543a6cb6e1ca7be95c70ec9dfee792e9adad9af131dbdfb07fe7396e13ec18dc7ea327bf62aff354cd8b38f17e19ff738aaacaf065b2d3ae79bf0be2066e9e062d9d04932091729f6de2f133bc31381324df41875eb8ebef6dd74c29ce4943b765e5013da8f1221bc8230c11f0fe5c907b13e4d75848d79175c0bada8a756c246371083735fe679a8f5e46b17f3b6338075d0cbd1694586d932332dee8590e95f82666a15ff83d3e74c1261c49d20897fd99de9c01ffed5ee409c2ef3e58991558ab37fc98e49f6664476f00c3dc6578a707d35292b3c0850a276977249819e20779a1bb3e506d2e886e2112ee552880bceee3d9d8b69d880b5929e693323d9400522f380a045d285d945e425ef49044abf716e09ebc421aba79f620ea371b30f3c568cbc690ca69bb8770c439e6290d4028b1a2b235a1fb495f0420c1cb4da1e84ac211b98cc8e91207663056035fbeac03bc0821aed7329346f1790033bfd05b4a96a55f883b26c7cc118df0b55b8b043729125cf36c5c96fad626ac9febaf7247d6e14a", 0x1000, 0x143}, {&(0x7f00000002c0)="0804544aa6051d608c323b", 0xb, 0x100000001}, {&(0x7f0000000300)="f6610d5f8ce2efa21a69aa3aa86fa17ff1eb46e4d041d32ce49941ea2a66db7c03c3d8d9e96d634fe87131499a27998956752458200700657f23832e0ba355c015a2ac367e4dcc5ee098864a05079c132ffea27241600be0c9790cbde09a10c1b3fefc52ca67c9dfe7487479b9fcde1e", 0x70, 0x1}, {&(0x7f0000000380)="610349b4ab5668a3fdf4c6f98c1de2f18f013d9665977e22cc6c6876f2966541eab4a31740b9ee722e4fc9f13801c960b808f36f15b7760434b04742cdbaab6c6657b14127b4f918b99ed39d9834a37fe4ef60931c6d7df63cc8803e39ba0e013b257a0991d92f2bf78cc1504839e7cfec543fab1276593d373c941ef247720efe861bde9038a508e76b3778bdce6f236f5a952e257706946fceaf4dfccd642e187063ac61a08d71de28e20d62acf34de41d", 0xb2, 0xfa3}, {&(0x7f0000000440)="694eaa273ed95edd56ad0b2fd0be54ddbee77f4eb1e5ba87bc3669af13d6aafa19c9a27fab4739a61b422c6d3d72283be0e60386272a9b81a4bb7979adc3b2eb5a36d329b91d3fe28ad16434dbb61183ea5aa9cfb325dfae2d535e3cf58fa8867e97454b68b49956796c101fdd0bbdd5a57a048754d90acb97fda7d14b06056679435af2474c3b31041609a53c3fb5a56b2a4f09aec54c4286d3", 0x9a, 0x80000001}, {&(0x7f0000000500)="9a9fce277bc40f33e5c103584ba8f4427ec5740ba316d102e1cea9c1624b9199ecefad208d4dfac01b4ef1c95c07054ed83e548a7b9d3c3c621108190faa5015609d6f8d54fe81c29c39cf57ea74c49a76bc0925bf3766d8b7843b1b4f6af8a7c97490bccea445ad142cfd19194c6d6b2ad47e6369e65a0156d6d6dcb469f0221cb2a7f60dae0f1edaa674e30987fcb8449a14f1744e8be3ac5f28b90c0b21ba306ac06b85ab0a96f67c709b8c", 0xad, 0x6}, {&(0x7f00000005c0)="897cb26bee8a50db69a3f25a0f4fd7a80ebad1a81e51973cde04cc63a42b013ae45c8009244fdbad2f170586e450cde6c7ac320d698449035831e10d3ad990c0b4ea00f427d220c3ab08cbddb00df7", 0x4f, 0x3}, {&(0x7f0000000640)="bf51e733", 0x4}, {&(0x7f0000000a80)="124231ff52297a4ae10e362d33688b4c5c05443130979afa6315f251f5e21d3644c3fef4cc96339617b371b530f096b22f9655f600e4a6b1444ed0fa50fd02aac17c77fe65b90d90a582c5d59b3612b7986792cf43458b648952c7931eb33cce45fd82e550c01b0b60bf7c69b0f05df3a28c63e9c10e4e9a83d814917647d61c84b4a38ea955c2e0d6eb2bd1b4", 0x8d, 0x9}], 0x400, &(0x7f0000000c40)={[{@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}, {@numtail='nonumtail=0'}], [{@subj_role={'subj_role', 0x3d, 'wlan0'}}, {@obj_type={'obj_type'}}, {@obj_type={'obj_type', 0x3d, '/proc/self/net/pfkey\x00'}}, {@audit='audit'}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000d80)=0xffff200b, 0x4) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000dc0)={0x0, @bt={0x7, 0x1, 0x0, 0x0, 0x9, 0x8, 0x3f, 0x1, 0x3, 0x5, 0x9, 0xd8, 0x81, 0x68, 0x8, 0x10, {0x200, 0x8}, 0x4, 0x3f}}) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000080)={{0x0, 0x0, 0x8, 0x6f, 0xff, 0x6}, 0x1, 0x3, 0x3ff, 0x5, 0x200, "266774276fb2ce3697663270503a3cd3e91b9ef5886e134cf459d23f486392d38922d0aca09b43b11fb138b0a9be28b11b2f5f6ea62376c7ab15b3a187acc6b0f635f75cfe3068e3ba155a3cef16ab9f7a55baa4982f399291dcfbec0f235a2cb10908c296843c25ba7b6ca5bc0d7436be621391a0a6314801e6b7cd37cd2515"}) 04:18:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708b101f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0a0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370935088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:50 executing program 2: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000001c0)={0x0, 0x1, 0x2f2, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x9b0960, 0x9, [], @p_u32=&(0x7f0000000140)=0x1}}) perf_event_open(&(0x7f0000000040)={0x2, 0x2, 0xea, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xd46, 0x0, 0x2, 0x4, 0x5, 0x2}, 0x0, 0x8000000000000000, r0, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r4, 0xae47, 0x1a000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) futex(&(0x7f0000000200)=0x1, 0x4, 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000280)=0x1, 0x1) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r5 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0xffffffffffffff80, 0x40000) write$P9_RWSTAT(r5, &(0x7f0000000300)={0x7, 0x7f, 0x2}, 0x7) 04:18:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003500056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 353.296135][T13821] xt_check_match: 1 callbacks suppressed [ 353.296146][T13821] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0b0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907028000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088001b11700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 353.410587][T13824] FAT-fs (loop3): Unrecognized mount option "subj_role=wlan0" or missing value 04:18:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088002f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 353.595462][T13824] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000b101056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0c0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 353.774855][T13821] FAT-fs (loop3): Unrecognized mount option "subj_role=wlan0" or missing value 04:18:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r5 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700002400000000000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_mreqsrc(r5, 0x0, 0x26, &(0x7f0000000040)={@multicast1}, &(0x7f0000000080)=0xc) 04:18:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907038000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088003f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0d0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003002056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907048000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088004f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0e0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907058000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003003056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708800af01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 3: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x101000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:18:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907068000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003004056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0f0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708800ef01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xa0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000140)) ioctl$TIOCGSID(r3, 0x5429, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000400)={r5, 0x400000000000009d, &(0x7f0000000300)=[0x40000002, 0x8, 0x1], &(0x7f0000000340)=[0x0, 0xfffffffc], 0x30, 0x831aaabbfe9a4fa0, 0xfffffffa, &(0x7f0000000380)=[0x0, 0x2, 0x1, 0x1, 0x0, 0x0], &(0x7f00000003c0)}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000400)={r5, &(0x7f0000000540)=""/123}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000100)={r5, &(0x7f0000000080)=""/104}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r6) 04:18:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000300a056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a100c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907078000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708800ff01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000300e056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a110c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x692000, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x12) socketpair(0x5, 0x2, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x3, 0x4) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{0x5, 0x5e, 0x2, 0x800}, 'syz1\x00', 0x14}) 04:18:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e3709070c8000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088060f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e480000300f056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907358000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a120c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708806cf01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003060056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a130c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708b101f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f03500d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000076bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088001b11700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a140c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0b101d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088002f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000126bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a150c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01701b1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000356bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088003f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a160c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01702d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a170c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000406bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088004f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01703d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708800af01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a180c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01704d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003001b16bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708800ef01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a190c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0170ad1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000076bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708800ff01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0170ed1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r6) statx(r6, &(0x7f0000001100)='./file0\x00', 0x800, 0x10, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r8, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0x0, r8, 0x0, 0x1, &(0x7f0000001280)='\x00', r10}, 0x30) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001300)='/dev/ptmx\x00', 0x10900, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004040)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000004140)=0xe8) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) ptrace$setopts(0xffffffffffffffff, r13, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r15) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x2110803, &(0x7f0000000380)=ANY=[@ANYBLOB='user_xattr,obj_type=proc,euid=', @ANYRESDEC=r14, @ANYBLOB=',smackfshat=dns_resolver\x00,fowner<', @ANYRESDEC, @ANYBLOB="2c657563940f", @ANYRESDEC=r15, @ANYBLOB=',\x00']) r16 = getpgrp(0x0) setpriority(0x0, r16, 0xffff) rt_sigqueueinfo(r16, 0x2c, &(0x7f0000000280)={0x2b, 0xfffff000, 0x7fff}) r17 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r17) kcmp(r17, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r19) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x2110803, &(0x7f0000000380)=ANY=[@ANYBLOB='user_xattr,obj_type=proc,euid=', @ANYRESDEC=r18, @ANYBLOB=',smackfshat=dns_resolver\x00,fowner<', @ANYRESDEC, @ANYBLOB="2c657563940f", @ANYRESDEC=r19, @ANYBLOB=',\x00']) r20 = socket$can_bcm(0x1d, 0x2, 0x2) r21 = getpid() r22 = creat(&(0x7f0000005400)='./file0\x00', 0x81) r23 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r23, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r24 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r24, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r25 = openat$capi20(0xffffffffffffff9c, &(0x7f0000005440)='/dev/capi20\x00', 0x2000, 0x0) r26 = socket$isdn(0x22, 0x3, 0x25) r27 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r27, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r28 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r28, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r29 = syz_open_dev$char_usb(0xc, 0xb4, 0x80) r30 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r30, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r31 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r31, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r32 = socket$nl_xfrm(0x10, 0x3, 0x6) r33 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r33, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r34 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r34, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r35 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r35, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r36 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r36, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r37 = socket$inet6(0xa, 0x800, 0x0) r38 = openat$userio(0xffffffffffffff9c, &(0x7f0000005480)='/dev/userio\x00', 0x800, 0x0) r39 = socket$inet6_sctp(0xa, 0x0, 0x84) r40 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r40, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r41 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r41, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r42 = socket$inet(0x2, 0x3, 0x80) r43 = openat$null(0xffffffffffffff9c, &(0x7f0000006740)='/dev/null\x00', 0x40, 0x0) r44 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r44, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r45 = accept4$phonet_pipe(r1, &(0x7f0000006780), &(0x7f00000067c0)=0x10, 0x800) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000006880)={0x9f0000, 0xb006, 0x7f, r0, 0x0, &(0x7f0000006840)={0x990966, 0x400, [], @p_u16=&(0x7f0000006800)=0x6}}) r47 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r47, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r48 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000068c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r49 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r49, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r50, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000006900)='./file0\x00', &(0x7f0000006940)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000069c0)=[0xee01]) stat(&(0x7f00000054c0)='./file0\x00', &(0x7f0000005500)={0x0, 0x0, 0x0, 0x0, 0x0}) r54 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r54, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) sendmsg$netlink(r2, &(0x7f0000006b40)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x104000}, 0xc, &(0x7f0000005340)=[{&(0x7f00000000c0)={0x1018, 0x2d, 0xaf425cfe29ca0c31, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x7c, 0x0, 0x0, @fd=r3}, @generic="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"]}, 0x1018}, {&(0x7f0000006b80)={0x23e8, 0x24, 0x2, 0x70bd25, 0xd7, "", [@typed={0x14, 0x6f, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x14}}, @typed={0x8, 0xd, 0x0, 0x0, @uid=r7}, @nested={0x1169, 0x14, 0x0, 0x1, [@generic="9413d8611ca39ab49b9cd8100fe62eaa33a156f70d92e19c6ef2bda5295be571a0c5427cbd0c1134afff4b7ac07b7ed0726c9ea9bdaece5980072ce301e867817704256d7a1b33e277f47cf2d91cc95f3cc6b70ad732332cd106e499493cf4db5c4b54908619429eb49f7d76d6df22eae800370a571e5f7f9cab99e280b99568ba893dea6fc9ffcd0a1f1d96f1b15ef804", @generic="c7b9523e7cd023af5cc15d53556d5aa00cab8df95f3a46bed483e5dbd5f0b44803baed8f52cbabd21a94826d77b89e704de802fbade44434525b6d60", @generic="364c5c931577ed5363bfd42d4b36eef65f2bbbd9aa4018ef320750168957c598915d0788e12a462690bd5b4e5588c4d0f6588bec1dcf8c7a8130d460d5c89dcc3786c1de1b2f5f741e72550f61f1a8214453fc72f8b45a50f61a478a30dfaf784f61dfc61c49596a79f47ca4004a7c76478beaf515bcad45c644a43449f0ebd8d8e0aa2874c59c70c6f61b9b94eb3537f553ec53bcbbb138", @generic="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"]}, @nested={0x1164, 0xc, 0x0, 0x1, [@typed={0x8, 0x5c, 0x0, 0x0, @pid=r11}, @typed={0x23, 0x4, 0x0, 0x0, @binary="540217fcdb9376b3a46f7fabaf0b8d6a3cd371ba2f6dee3fa6ede2c2897304"}, @typed={0x14, 0x2c, 0x0, 0x0, @ipv6=@mcast1}, @generic="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", @generic="6579eed374f1ca1e7a17bb0bd5b88036c82451436da006f0acb3977c79336b2a96ba896491fe0ec22446f5f6825dfde8d8767e58a4cb38a56a2935134aad630807b38e9fcd952d45e20818b886871cc8c37aa8ebf1dc67c06510fdd8e940d961025980047b6ee354152d2116d4cfeac1ae30ceac222772ba41f30cdf7ec6441bae98031a9e1a092e07b77d8a99d2b881ac56ae0b10b32fdbdf5948096d1c72c7caa3d6fbf21920b70b4b4c6956", @typed={0xc, 0x94, 0x0, 0x0, @u64=0x3}, @typed={0x8, 0x4f, 0x0, 0x0, @fd=r0}, @generic="7464c67dbec3e0b26ba8dbcabc4232b08fed69c36ca9f2e86cd53059e193cb3ac1dfacfe760a78a00ea20d6d5d2a8239cc823c114748d3e27542a01587695fd653bc63d7c5215d093761a5ca6187f5118a334225e85b64", @typed={0x8, 0x25, 0x0, 0x0, @u32=0x3}]}, @nested={0xe0, 0x8, 0x0, 0x1, [@generic="ef907ea7164fc3707f6ffe014f1d248fa2bd4ed0fe1b59018b05e46d8614041020eeaa5de5a3bba947781f38a4ca3a10d4aca20b19b66ba2bf71a1de955bd24e9561e83d874cebaf70ffba86ef6f90215ae221aff29c324af7b4f65c17acdec521b2d0130b1c7f8b57cdae525d1f2f01fe8f66075beb718cb9e94e741093622c91d8d1c41715f6a245d79122176a61389f6f2c14d6b6c6efd6ac766718d2c52d1a1035a6c3c37e507ea7de22da3507611ed0331e84ea3fdc169b590bee2c38c10ac25a7c732db5027efcc6bcf919d1a90d8cad4ed7a8d4df4dd2c781"]}, @nested={0xc, 0x1b, 0x0, 0x1, [@typed={0x8, 0x16, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}]}]}, 0x23e8}, {&(0x7f0000005900)={0x274, 0x1c, 0x400, 0x70bd2c, 0x25dfdbfd, "", [@typed={0x8, 0x8c, 0x0, 0x0, @u32=0x3}, @generic="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", @generic="839dec32abd97c15b41dfe537a1b79b62c0d0d6411edb280dab76bb5717a3e83083767ae4c4ca62f63b525dc7778143f945232f9f58f7b4400f2dfe3f65303348cd58f954cb7f53c59aee8f27d08dcd730ba37ca3447cc95a4dcc84d5568869b7e56c16cfe2e8ec9100b65ca1c5153ce726206df53e0f367fc9289722e55", @generic="dd88645b936b8d13ca73dbf944f6534ed3707987e6e8fa7fae22d938ea6e870f7dd775ebfa8a05a4dd35a091ddc1b3d30f80cc5dd7f6044fad294f5fc4454c0c73aac85c0910e31d49df4b7e52571a0b82b1f3", @generic="5b5811c616863118a5bda03be1bc239ee9056517cbc0d8daa85a127d09de831f36970fab0d2fc6c7f9a20a011f4166c26b1581dc6cec952aa719ebc7bbe49e57765e6218dee4fcc12982ad0d4ca597533fcf44ae54076bfdf7719ed01f2db1bd7c28c1889b1d60bc1dfa0dacd8b0911f45f3561abb0a1048c00812fd67ae5b9c353e5a31b294560511f3d153"]}, 0x274}, {&(0x7f00000039c0)={0x58c, 0x33, 0x7a807815f0da1d4e, 0x70bd29, 0x25dfdbfd, "", [@nested={0x178, 0x5f, 0x0, 0x1, [@generic="038784b05174fa3d617d41a7fbc70e7fff514ca35d1923e438a8b8113e07dc0bf42e1954450bdbe47f89f6d2056d020ac0c62e75cd1e9231aa2fa01a626552c165b1bea8924f2c049b23f440d411c484281f264f", @generic="0922b64e587d68c3b91a763fc87bf0eafc8d8c9353d43dbc1550b88e0f0d2655f8ce9caa2561c205fda7a28ddfa6db2e2886ca2762e9cf793a89854a6b295b0f3186bc10357ff807e7f03b7be910a0f29aa0ebb685a2386326a3d47f5f167605a6dd8332d77ea6095e152dd0dfee23c19ad6ef687e8c8fcb5df545a9402a7151533caeacce0e0d311e013664b2f46876fe364a48c6ee6ce877c2c49f9648de85fb137ade3264f9bca9626631cbd450daf3b93d6a2b69768192e498d43ca68ecea82654fa4983d3f7c8b7ca85936ff2be00ad85fe2197da8532cd602d47e20f1be7494aa54726d3df6411a019", @generic="1a24ba1c5ef6ac85b93049ca0d52141f62f678771c3837285f97f4a2a70d37c1d99b2bfcee39c705784190906239538195c7312d"]}, @generic="951d166506127503211dfc6e6aaecf78a86ffe97f089f87808d24979ba04dbfbeb7d0a0df784b421f79c43424d25b5a722d1f79f87faa658b16cac8f5f4a9375a4acb2027e4d0d1451ebb3f89e78481360346e37a15a39427743dbfda833a9b724b0294798a0cfb36b1b92a98f388fdf2c4ddbfc063437bbad8b52b3c3e6de8747e1f15054c5074783ae973eee82f3ca563b17c2eb1a44310d74487b742a7f94904b462fd8dbcd29dad8e9514f94c6c91c7c0c6d2fb7be53d7f835e702d7359b851702db6928fcb94e039a5e", @typed={0x6d, 0x7b, 0x0, 0x0, @binary="0e74989382a0eb68dabcb7ce7b5ec60f5cc373b91e180045a85ee9404504275ba51143e40e2d40a3116c70aae4a7452f661550270023de1792d192c492e38498432033c2385ed4bd6f352a661890e61c8e949bfc131e8b7e88031b12ccd066e48ed6d746f5c1ab11de"}, @typed={0x8, 0x63, 0x0, 0x0, @uid=r53}, @generic="332d35ff572c2766b3d119ce75c45c", @nested={0x162, 0x68, 0x0, 0x1, [@generic="94b882176e03a1ecf80e5f296ed4b5f7e65b52974105a507c6d5decc9df2c7b66116b060f56f26f7bd7ba471abd3fb189ebcfe3d91b9e4e38dedb90037b82caf4813070bb8354a46ea167da5c21f0491407fb9d3c680bcc623536f61809bedf52539276102b6d508dde8f5014499c2d19dd767f9ad6a7bc28b1c1e5fb584049e0b478b92571860c9a81d59af477c13d857c8c9f2b4be9e38563f41501247bee64351804353f2703e7f9cb12d0ec9bf55d46fbcd07dae258e2d0b403c655dbc611ff02d5efc749c08b4f8ac250381231171de9a256a2f372fed60e015db7c35350c616280f0d38209337297d951", @generic="c136a6becb6b24814af67da2ca9405e9b9", @typed={0x8, 0x22, 0x0, 0x0, @ipv4=@loopback}, @typed={0x56, 0x8c, 0x0, 0x0, @binary="36b3c22adc35db046cb539324bcc29077d3d615bf6cf795cefb31a65b3fb54dfa3fb0a1cf16ad0bc6526135591bf32a54dbd4aa4877b967f3b0c0c86c12ad1368fef49ffbdebc7475f3751c39de1f3c05fd7"}]}, @typed={0x8, 0x60, 0x0, 0x0, @ipv4=@local}, @nested={0xfc, 0x7a, 0x0, 0x1, [@typed={0x8, 0x66, 0x0, 0x0, @fd=r1}, @generic="a3df52ac386b7c17e3f8662e9f10e8756ab017275da3eb86d730dc7736c503d3bf8d9e63cae5eacef1939ab020b8e1926ac9041cc22d507a708ce4dffdcb04c142be76e7351c415624cbe4c74e16767cd1ce4f6d7b884cc81a2e03e408c691e4c0a916b4cd5e1a593d5d7ca6015c45e1501c6253eea4", @generic="b29fd416e130cf8b749e0cdac4950b5d0d2cc4951902f81ed4e97bc2aa0b36b1aa22abd85209f07df2cc35c181a51b344b12c24e92e9faab0bcb61bded0b394681c2efc55950ac4a12487c9e30919d8314f38e24f5c4cbbe2e9d4e726d92a0be2dba8ae805a387fb8635b65c610c0dde41340c9b7fbe871d5268"]}, @generic="bc1713fb9ce415eecd26ebc07e3ea3f5b33433ac9cbeefbd8ef5cf52fa8b80a9237820026590a43b8d038688de3fd97cfd6904d8387bd9dc9c7694640e7eac", @typed={0x8, 0x8a, 0x0, 0x0, @pid}]}, 0x58c}, {&(0x7f0000004000)={0x18, 0x3f, 0x200, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x65, 0x0, 0x0, @ipv4=@broadcast}]}, 0x18}, {&(0x7f0000005b80)={0x32c, 0x1c, 0x2, 0x70bd2b, 0x25dfdbff, "", [@generic="4b31dd45b91dceebc7eaff4939280b35ca909e27416bbd0c852bc8258bfab065630f12f7a82cf582b98119fd0e7cf60248048882102200772d2cc0d983c2e113d48539ec749b3ed286ea25b5170271f0c82aa749970c7467edd5b52eab0538e891ac2bda69fc915c99c096d3", @nested={0xc5, 0x6e, 0x0, 0x1, [@typed={0x8, 0x66, 0x0, 0x0, @uid=r12}, @generic="3cbde3595103121dc7a1ce0620f6d838f253395e10c5774af14ef8369b06b54d762ddbd8619587b62ca8f3bd1d76451cb7f917cb8844dd97143b14957c4d95ab33bea2783fc6cc4f6b35a915a83b8bd4b5492b2e788fc2a30fadccaa196c49c3ecf157117534739aead0e0cf72051679a09738d497", @generic="a26772346a8401963ade617b1a077878b052dc66416f6fa2144bbdade634106532c2296c3505a9", @generic="c6fb4e2adf49f1edc058fdc3c1d48d0e5d8f64f761", @typed={0x8, 0xc, 0x0, 0x0, @pid=r13}]}, @typed={0x8, 0x2e, 0x0, 0x0, @ipv4=@multicast2}, @generic="122743c8e2a5dee52c497814ca45ce021e48b40be786d359add870c92084ab7390c66229fa56027d0b456f243e20f1adef0e55f79bb87f09ee69007a01556b110b2f3534607641bec7cbf37c75eb814cf425a528a908d9b1be9c9ed8e9", @generic="b6fd6368a534b51bff8fab1ce752503c8d5c0922b2893a14807d6e908419e8ac182b68c458e198c4165d01042dd2405a8b47d795e5409d1ceb5859db0556d033e4c5fbf5c03a3d1b4f1a5b1167e13fd839ae41d7b3f0cda305a20722204d070da70d38b827641b2a192808c7d31fcb9f3789ab9c23ac01660c9f8337b11fc5ece393581a18c04c009d09a5b949eee9c0f23d3e1dcef373cfd1b3ea72c7b7ab199ea1e21ed9e80df45e26aa2f79de6d04c8fb7004ddfdc76d76ca90a9c1b1bd24055616d15aadac4f19e1f751e19c241e431632ae2ac38c980960616f", @typed={0x8, 0x64, 0x0, 0x0, @uid=r15}, @generic="578c7f26403bd716fe37b027420a32c39dab0b6400f5ecfb119e014fb66697626f389e4c7ded74989a41cdea0fde3fff2b49f77ca9479fa85295d782d11dac77d33d3e10084ea93b0528782b3b7a623fb998d1eff91999264fd9ad642405ed4f81f9075bcd201c18f42aefb73d25746d4e42fa21130551b42ee78444f747dbfb3de7a3b08d57256f904af5b9d81419e2b114b7d2cc24025da622b75a1e"]}, 0x32c}, {&(0x7f0000001340)=ANY=[@ANYBLOB="c4020000220000092bbd7000fddbdf2508007600", @ANYRES32=r16, @ANYBLOB="6dcd203065cc20e56d1af5111af3bd0b6dcfc1a1e8b525be96aae27273c119c63703db6b437c62f9c10332ad447e07f3686c4cb957219c461d326aa052e4ae81cd5515b5edffcb3f7ffa61a424cf76a812fc240b06ca18cef6339750e24feae534860a5726fae7c0db35ad42263681db307e28d3a5b844c2555d9add4ec06bdc244d227826c52df71c01b02cbb89ee87685b952586ad2e6dc2939a7dd9d6bafdf31429177f247a1998af769c9fd20ba2cd4bd5a7a4fac4be06c2b21b15f520b6739a5ea224a7541e1c42d19268184f796422e6348c893642954f4747c3f236fc9224b3fdbdd4225dee318b33776dfa0f5147c7e63efe31ae7ae75e5b5b4796a6377a159f9f7c830c2cb46d54cab0c12c76f9d2a9c4168ff2f6010644770a68982e03a36e42399c4b788d8fce3fa3180a547724c23cc9ba7d14000ad66edaba1c5948ef99e4024507929bd71a1262cc94d34616f7b1fd9912e2bc295e6dff65dca396b602c3ef03bba749fb70c0aeb682c0bd5ccfe97f44423e85c673497dec4a3f9629415861d650619116dba1d0943bd4b5cef1e6881ebfbdfe4bf6bf1842a5af6190e2c6799c357f9776843695b287ee2f08001800", @ANYRES32=r17, @ANYBLOB="0c00738008009500", @ANYRES32=r18, @ANYBLOB="a6f35a86701f8b44a7fe419dd8e84dbd2edcf2feb5b1c12311071f98ff3dfdf15e586f4815fccbb52d537fa39196522bc035818473b1ee4a6a40616830c353f6018288b4b64f4e6a219612daed809fd7c69099c8a38ccf68c5f8dae5e4f7a7625e0ccc72fa32639ce5614b892dcd08743314c82987d4f955104621b62c93147674dc0323dd34ecd8d9e4c86a456c1e49e16d03035fd8852dc4e0e84811afbb74f44c128a8bf40719985db69c2f553f0fd1f284135ee3d1f69a29ad649966bc4ccf2ba8eb27ade6a953cb0c6df80cd8fa96bb58f7623ac89d04055108008400", @ANYRES32=r20, @ANYBLOB="0000334d9c9c08896d0e930f624cdbd97b3947dc87294631b63e8294e77820381613abf8024771e423fb60a00afc11979197e6713225422e1c3b70dd4fcb6ffe333122a42927fd9165cc8b1c9aa9288a12a8a685f3b4bd0ff1f97494f4dc5cb7d627312bdd92b7446978c84c8841261ab5a883c36c3bd5dae0075f726ecb478d3ca58d9aa86a4df552abccd0beeeaae5765ad37abad5bdefc020da18c0e906f6cd6cc36a88a63bece6f15d55d72862fae612efdc917584a72d6654a823bf010106142e96d1b22ece61f22c9cdf3014912e08981a1fc636f0db"], 0x2c4}, {&(0x7f0000004700)={0xd8, 0x1e, 0x300, 0x70bd2b, 0x25dfdbff, "", [@generic="6e74272ea667cd97911316f80a92aca6276c56b5ac1dbb7584dc6ac3a3c68b83f644d4c5a43ae88e7accd81f78358c8d5669fc8bc48a882ffef47f36df728a9846c27cf79ba61cc04dec0ee24fe3ea53ec1a2525b075d1e759ff274decf5926b4fb4fde3b80fe92a09f06404035e7984fac97fd9ba89df98152d85d275c2f17be541c1424689d3a02a2c8fa6e6f73481455bc9aee2f30a5be3571e995df91e38b58c67b9acd06e2a9ec5ca703c2efdc1b0513f0c292dd4ed02fe06db31e7", @typed={0x8, 0x6a, 0x0, 0x0, @pid=r21}]}, 0xd8}, {&(0x7f0000004800)={0x788, 0x20, 0x4, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x60, 0x7, 0x0, 0x1, [@typed={0x55, 0x3c, 0x0, 0x0, @binary="43ad3d8a1bbf1acf63281864e0864d4a4e93a7a231a759f7a5e20198284ec181c6abcc2b581debbe51da00739463fcd729ca793fea9f3b42ea8714ab31b7d456e4f4e2f2ae7b31315b91a8043773edb6d7"}, @typed={0x36f, 0x3c}]}, @nested={0x4ff, 0x45, 0x0, 0x1, [@generic="0bb5df3744e4a794f5cbb0bafe005d2d3bcde3806de73ba5854471e7c349f7fdd9220a4bc3a181d378d4590bec6377867fdac3a94ff87e42f0c69b1499332ca603d2c7832615f969fb0536e3660835b102ce43124427915d7b5d583cfba29528ad072f0e0307440c06015630b67ce92cb19b393bf189997d0185979dc9662d2220fe7189d619383a9466941ef04299045116206624e9fb9a84bb3ff088fa2ed5ea70c412e5dcd121253dda1d08a346f5e26bceab5f496e069d2f9103f08a86fa1a7e97861ea012d5c66353863f", @generic="5244c5083964ddd52bae85bc48b4e0cb9326f4016e", @typed={0x4, 0x27}, @generic="e22ccef4a567d0a336dfdbac6f752daa0d716f29d43173b1a7145b8681b857bc1934224c35ad45c28be65c39c262b64d59c53ecc07eede5ff013be270f182e12856b2765ef7e319cd9486ed9d9ebf63bed10ad3f7a98f7514216d00dc32b882a7472edf5ceb5bd2092154917fcc9e5bae982d8619f197f422c69c9d833beb5e9ff788d4b5c20de986ff48795f358d44f82b7b5b611fe5775369c4cbfc33cfa124735fb44b8d42a1a6f6ef25315264256d1457c4bdadd63d373492b1f8f03ecac76b42e74855203d67c5c02587c70fdcb9a392946ace5a686b67d520bf7fa2229de395a1261110ce57f683f1f3f01a03a81dbc74c0c", @generic="f26ae65240c36597faa523edbff6eaaf04e27c4bb1b1c1cff67a541cb6262e7b6f6138f8972dc608aa8005d325ab5a3d2be6fffac1c4a3ded1c565da208c9139a57d94d86af4be48f55dfcb2babdc65c6cb5bbc31bfa68ae3a52a43880e697550201dc7943e032dc2720a009ed8804241e4dcbb044080f2fbf693e9db0cdb61a4dcde22d976ab120606fc74a4863637640058cd324f75f36bd784de7564984561feecf4b3e42505391737e50cbaa31831c396f1343ea52f37b433b32281edc60cb713d36665a4ed3b44da2d587d67ff9fc20505a2e920b31b97cb585a43bcfed032ef83c946ef996489bbec1e3764bd4a8d67bc394ce", @generic="72a0ef315253a6e9d17f5f8564eb9cd50597073d94d12ecbdddaab6526a037b81fe2fd0bc89930a5e64d4bf710fb30d693a9e620a6b0b5768adfd07fb6ced9de71e4595964bc7d537e2bc403fa2880b3fd73eb976940710538a388dad9d5ff8a5cd0a74d", @generic="a60f0d75df09", @typed={0xe1, 0x84, 0x0, 0x0, @binary="ad4cee718a3f4d9649743b6039ab387ad34d689bc42963e1b5744af58f4100aa06a58f4eb70be59f3cce3926c25389fe2c9bec5309e5a2e5dd3c6688e55e9f8dc7a837347e3e643eb3f8e9c2fc749aed47333ecb14c66669390ae7e63f6e75158939ff4b1437568daf41ee0618ab62c5f98418e37c0ba946c712a683d43ee28bc3eb9468bd7c4efe52d0bf3aec8270f5963f008ee15b9060b758c35b6cc314dc249586c8bbbde1525171e4a0674478f6fc6aaf52d216ebe79367500e9e168da73fcabbf4db956affda56ccc62d6632c995d7caa2e0ac133984456a654a"}, @typed={0x8, 0xe, 0x0, 0x0, @ipv4=@broadcast}, @typed={0xd3, 0x58, 0x0, 0x0, @binary="a4ae4a8f9d38861fe8235abe27a1d8e6c53024fd6fcecdf92f6ed6457ab57a35bf52696e20969e6592377595110b7996eec9bcd600dc2f35be958371994e96ac69e251f68c00822e0944c2489655024337461d5e22fddde85f7b060b896910a55e0448a081ede71ac1669d8b3b4efbd430a507e9d79d008c3b574220a3b16b75a71dd7f7a4517c58b0ee991d7b781a3a84f72d1e5b2bd9f32db1d7022ee4bc4ef0cc4f1d7bf1be08bce009d92952825d9fcc92e077a0bb383551128befd49b6f0a8327d84764996365c8502afdba83"}]}, @generic="4586e3d338b58a243129c0bdcc179bd63dae8c2aa6defd441fb328b597be0b340c66f323d0b1400bb0f382871493c62a0fb697ef0bec772aef87ab555837682b06366e52ce22d2ae7a6f1745a4208343840e3e56fc488e58a6a4abc2d3dc14f1e3befc788f3a8c2d9362b4533f404d346d621d5d4b6e4d210839899ecda706293e16baa25186a0dd4c7e90bdafaccb13c60dc7f47d14a85e3ba8798301ba991f9494", @generic="00775fb5e61952df67de013742fdd26e5abc5114e3ec111e67a50657dc8a8670855dbd1f613393", @generic="7880f55a0e36ac23208da3c538e0776558f5031348a53e18e9c6d9d679c6b60e314ebe8b12d6040bf2fcbac516df6010fc295e4d690e79c62dd259b414bb775dde2d0971773cf632d82383f980f8b89a0bcbd3ed8db9873a8ea4d70cec110481201031fb79eb8c6e215e016567287cd73e200c204641de03631282effc63f74df6d245012a46aab73d", @generic="e30bd187b50d19e609f8dcf5a2912be916281e18fa848029c21dc5e4e8a9dce276eb9e732920f7476a9dbd3ef1cf53c927d653c6ef4d99d4e144296c660e717cff8b7ca5fa819c5241a9f84968b0a5179919a0202b570a2ac411a196652972bc192e0f9c9d96bbb496200507253365d97811a196ae4b192520dc73c995043cc056918429e8f48701e37747518225d5444626c79126be928e4e96a012498ecec3ad17c7434a8890de2ec34279b30fd4b26a685bb9c1ebc27bc8e129b44a2400780f3f956b8a"]}, 0x788}, {&(0x7f0000005580)={0x36c, 0x13, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@generic="7222bdea4d86fb79a486daacccc2df3c0771371d00c56a950480bb921b6099927cb61939e0d0cfe8666e1292fba6a7c4639a448ce7f6201455bae080d53452246077a3fa735dd194db2c64f60ab1c983e0b7e7525714e72e797ba8215e3f7ecd25bbeba30416d8e7d625b6201f0fc02909bff34e893851f00c5c68ea752d9104e95382baff9dce29c8ddc5fc5a7c430900b41800056d26105ebd04a71f18cbd4c405bb76a67d50151394fa6f025c98eff5bb7b7ff720", @generic="9f594600bfe726bb7198b54f0effc82fa820a215f6c87a8d85634d897f948e96fce6d0d20d61119e7549", @nested={0xcc, 0x3c, 0x0, 0x1, [@generic="0eeb80e913414c7f19d2c769ab81ebd60eb659ff1d5256f725acb330af7e399bfe8a75fd3594ef5978f8336a9db90ddcbe089a54da4697c6f23defb894770a793ec69bee2e562f12a9f26c5fee0a4a95b273985127fd142284c4eb62a6f284575462565bf18e86e27e309640948c72e1efea8f01fd29315a77fab068770c18ac36511326e6314dbb53863c9c09c2f1a7c4cd43efc8eb2b7edae31bf67390088d2816841316a07fe3867706aa54b09bcea66401471fb5bd435ff66327e5dbfae607186e98e6009f13"]}, @nested={0x15c, 0x1d, 0x0, 0x1, [@generic="7741885632413873e621ea3e30e636aa56e574283becc14eb2b1935f36411c835290a4c7f4", @generic="7268bbac2ac396255f17d4ea116cae26a37ab1027381cd8a899d013ea70cafd1487dfdcd49e84eb3f26940b37a76dec7457ce5871b532cf8d6690c88cde5d40514c79da9cb161dbc6f4c10163e67c8d40c7504cecba68e8a4f74354d650dd460c00bec9f4846680639fafcdffaa3e532bfc10ec78514463e15825b23b670ed604e521df75bc71ffeee9bf07b7a6cfb936cb13fb2082c60c6021ca4baf44e2e0569996c2867877cb0e14b93309dfc7649c55bb2898e280d89fd517862a46aa15f626451861ce99a77c9a471d8710b49441b79b42dd4593bea1778faba853cb0b395add160d97f96865dc83295b39a2caea17825d492b3a035", @generic="3c0600e81ccbf5bb93134e4121f179", @typed={0x2a, 0x6f, 0x0, 0x0, @binary="f7b9c6d012b5271ac8f7bd48c70285ea57491b717d6ab758e59ce30ba4a2d1d05e6c9030a37d"}]}, @generic="6aa6bdee00c4aa2f2b2cdd0152b0912fa4b93fe19e9dc2f231705c9b19f3bd0ef7720d7ea1b6776bf7a384b3b6a61376d83b1f14026bfc5620bc6e", @generic="9c1a6184b7dee8da0a6846fcb7108ec037cfc1459f6598befe"]}, 0x36c}], 0xa, &(0x7f0000006a00)=[@rights={{0x30, 0x1, 0x1, [r0, r22, r23, r1, r0, r24, r25, r0]}}, @rights={{0x2c, 0x1, 0x1, [r26, r27, r28, r1, r29, r30, r31]}}, @rights={{0x30, 0x1, 0x1, [r32, r1, r33, r54, r35, r1, r36, r37]}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [r38, r39, r40, r0, r41]}}, @rights={{0x30, 0x1, 0x1, [r0, r0, r42, r43, r44, 0xffffffffffffffff, r1, r45]}}, @rights={{0x24, 0x1, 0x1, [r46, r1, r47, r48, r49]}}, @cred={{0x1c, 0x1, 0x2, {r50, r51, r52}}}], 0x140, 0x40}, 0x4001) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1a0c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088060f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000126bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 357.861298][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4002000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0170fd1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000356bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e37090708806ff01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 358.203312][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.225891][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01760d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630c4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4003000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 358.357570][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f03500d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 358.429682][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.465336][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.517331][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.584820][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.636092][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.670184][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.705464][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.860493][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 358.877873][T14051] x_tables: ip_tables: icmp match: only valid for protocol 1 04:18:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x1, @sliced={0x25c, [0x40, 0xfffc, 0x1ff, 0x8, 0x0, 0x800, 0x1, 0x2, 0x2, 0x2, 0x800, 0x0, 0x0, 0x0, 0xba, 0x4, 0xde, 0x7, 0x1f, 0x3ff, 0x1, 0x98d, 0x3, 0x400, 0x9, 0x2, 0xffff, 0x5, 0x315, 0x3, 0x0, 0x8, 0x6, 0x80, 0xa8e, 0x2, 0x7, 0x7, 0x9, 0x5, 0x5, 0x8, 0x1000, 0x0, 0x2, 0x9e60, 0x1000, 0x8]}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:18:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0176cd1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4004000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c63354007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0b101d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1b1", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0207000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01701b1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4005000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0xf}], 0x1b1}, 0x0) 04:18:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0307000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01702d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01703d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0407000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4006000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0xec0}], 0x1b1}, 0x0) 04:18:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f00000001c0)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)={0x4c, r5, 0x101, 0x2, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x0, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x0, 0x9, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE, @IPVS_DEST_ATTR_WEIGHT={0x0, 0x4, 0x8c83}, @IPVS_DEST_ATTR_TUN_PORT={0x0, 0xe, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH, @IPVS_DEST_ATTR_PERSIST_CONNS={0x0, 0x9, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x0, 0x8, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0x7fff}]}]}, 0x4c}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, r5, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa7f}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xb8}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x2000000) 04:18:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x482e}], 0x1b1}, 0x0) 04:18:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01704d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 360.045657][T14157] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 04:18:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0507000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 360.142030][T14162] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 04:18:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0170ad1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x4830}], 0x1b1}, 0x0) 04:18:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0607000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0100000001000000b75d4ac6975fde1c1a9fef"}) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)={0x100, 0x7ff, 0x3, 0x1}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 360.559989][T14185] sp0: Synchronizing with TNC 04:18:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0170ed1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x34000}], 0x1b1}, 0x0) [ 360.607028][T14181] [U] è 04:18:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0707000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4009000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 360.907485][T14185] sp0: Synchronizing with TNC 04:18:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x20034020}], 0x1b1}, 0x0) 04:18:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0170fd1bd", 0x33fe0}], 0x1b1}, 0x0) [ 360.975748][T14181] [U] è 04:18:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0807000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400a000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x7ffff000}], 0x1b1}, 0x0) 04:18:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x20402) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:18:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01760d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0907000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0xfffffdef}], 0x1b1}, 0x0) 04:18:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0a07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0100000001000000b75d4ac6975fde1c1a9fef"}) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000440)={0x59, 0x11, &(0x7f0000000040)="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"}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:18:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4025000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f0176fd1bd", 0x33fe0}], 0x1b1}, 0x0) [ 362.022098][T14261] sp0: Synchronizing with TNC [ 362.089416][T14254] [U] è 04:18:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2}, 0x0) 04:18:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0b07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:18:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4035000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1b1", 0x33fe0}], 0x1b1}, 0x0) [ 362.509417][T14261] sp0: Synchronizing with TNC 04:19:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3}, 0x0) 04:19:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0xf}], 0x1b1}, 0x0) [ 362.597323][T14254] [U] è 04:19:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40b1010000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0c07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4}, 0x0) 04:19:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0d07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0xec0}], 0x1b1}, 0x0) 04:19:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c020000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:01 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000100000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000010000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r1 = dup(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x101, @rand_addr="74dfce7aab26d7c6bda9963b7b6a5b4a", 0x80000001}, {0xa, 0x4e21, 0x1, @mcast1, 0x10001}, 0xffffffffffffffff, 0xffff8000}}, 0x48) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r6) write$P9_RLERROR(r2, &(0x7f0000000080)={0x16, 0x7, 0x2, {0xd, '^}keyringppp1'}}, 0x16) 04:19:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5}, 0x0) [ 363.508249][T14323] xt_check_match: 6 callbacks suppressed [ 363.508262][T14323] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c030000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x482e}], 0x1b1}, 0x0) 04:19:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0e07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x4830}], 0x1b1}, 0x0) 04:19:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6}, 0x0) 04:19:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a0f07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c040000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x34000}], 0x1b1}, 0x0) 04:19:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7}, 0x0) 04:19:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1007000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x20034020}], 0x1b1}, 0x0) 04:19:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0a0000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1107000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8}, 0x0) 04:19:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x7ffff000}], 0x1b1}, 0x0) 04:19:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0e0000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9}, 0x0) 04:19:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1207000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0xfffffdef}], 0x1b1}, 0x0) 04:19:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = socket(0xa, 0x2, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r5 = socket(0x1f, 0x4, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2}}}, 0x1, 0x7, 0x6, 0xfdcb, 0x5}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000003c0)=@assoc_value={r6}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYRES32=r2, @ANYPTR64=&(0x7f00000000c0)=ANY=[]], 0x3) r7 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r8 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r9 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000400)={0x0, 0x2}, 0x8) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, r10) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, r0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0x9a0000, 0x4, 0xffff, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x980924, 0x6, [], @p_u8=&(0x7f00000000c0)=0x3}}) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r12, &(0x7f0000006a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r12, &(0x7f0000000440)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r13, 0x709, 0x0, 0xfffffffe}, 0xff50}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r11, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400a20}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r13, 0x3, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x2}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x1}, @NL80211_ATTR_STA_WME={0x14, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x36}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x2}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4048004}, 0x1001) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)={0x8, 0xfffffffc, 0x0, 0x0, 0x0, "01000000402328446c470a53d054de1c1a9fef"}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) 04:19:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0f0000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1307000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 365.664564][T14393] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa}, 0x0) [ 365.773191][T14393] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2}, 0x0) 04:19:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb}, 0x0) 04:19:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c600000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3}, 0x0) 04:19:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xc}, 0x0) 04:19:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1407000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400cf00000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xd}, 0x0) [ 366.462633][T14397] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 366.543675][T14430] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x2, r5}) r6 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000180)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xfffffffffffffd7c) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) fchown(r2, r7, r8) 04:19:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1507000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4}, 0x0) 04:19:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400cf30000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xe}, 0x0) 04:19:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5}, 0x0) 04:19:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1607000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000300053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 366.934163][T14450] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xf}, 0x0) [ 367.089650][T14458] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1707000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6}, 0x0) 04:19:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000a00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 367.262391][T14458] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:05 executing program 3: semctl$SEM_STAT(0x0, 0x6, 0x12, &(0x7f0000000040)=""/89) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23082}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x2, 0x100, 0x70bd2a, 0x25dfdbff, {0x6, 0x0, 0xa}, [@CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz1\x00'}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_MASK={0x18, 0x3, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0xc006040}, 0x4004850) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x4, 0x6, 0x4, 0x20, 0x2, {r2, r3/1000+30000}, {0x0, 0x8, 0x1f, 0x1, 0x3, 0x3e, "50601945"}, 0x6, 0x3, @userptr, 0x3, 0x0, r4}) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000180)={0x4000000, 0xfff, 0x26}) 04:19:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7}, 0x0) 04:19:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x10}, 0x0) 04:19:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1807000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 367.565241][T14485] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8}, 0x0) [ 367.645444][T14485] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400cc00e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1907000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x11}, 0x0) 04:19:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9}, 0x0) 04:19:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x12}, 0x0) 04:19:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a1a07000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x8, 0x5c, 0x7ff, 0x2, 0x1}) 04:19:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa}, 0x0) 04:19:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c004000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4002000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x13}, 0x0) 04:19:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb}, 0x0) 04:19:06 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"/905], 0x3) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000b00)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r5 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) syz_mount_image$afs(&(0x7f0000000080)='afs\x00', &(0x7f00000000c0)='./file0\x00', 0x20, 0xaaaaaaaaaaaaa75, &(0x7f0000000440)=[{&(0x7f0000001300)="8cc4cb8a39d21af90d45cc2dbe107d2244adb759469519ce548604fd60178a686d45b3bf06aaadf81aea8d500b44d1769d8684b73d64e236e551f4aeff1ffd5d46eb13b15ca2f45ca0d97ff277bccb5061b577fa1973c57b90ef03ed61440790ff1bb19920a0fdffb2255adf00a23a4b5c866335d7fba1c14e6710a17e2c61e6cb3fb7a0bed2bd0655469690b21a5ca1f5d0a3a5cbb844ec423151f8b2ffe1ca0b15848e4550b2a39e0ae9ea406f22821d7af807483565c43c09c69e082bbcce24c3dc1ec4f06c2844b55169dc74406e6ecfb033636706a49753a4711c442fb35404e1e9a16a193cdec2525ea8391791f2558a808cfeb6ceb69c28f1f6c7fd6e177333a079723c2eae76b1b9b3e0f49b92ea317b0c68f8ae9c5839f4619efe54921fc9293efef2c3acf0f7dd954c2e23e99df31d63ae1b5581f0f3eee62646baad594be27b31e9ba07a58267121298a735a9048e707c7b9a5562a6a7dfcffa5b649f5e210a50601394be1bb379ac283ac159e3d81b26bd6b52cdbb761360fa16f4ec3dd4a79dce03bf0618078c85237cedfc08120bb4d536815a1db90a43cd9ae94e3d3e78885ff248641813b69a9bf6e21ae80dc7e3b6ddc40beaec161245db7903627645bf11a9ec69bf8368da4d37693262087110b35e0923415783a8dc047eeec8b2f55e90f860ad28694593e6a27af8fcec156ee915188dc305f9bb05a9aacff3616180a9c996d51568a71b03b85307ec3db5e6022447f2f9cbb84daaf1f274af96ffd5086ea3378e2bae3896927fc57326433543e67b679c9140ab312483250351140ffad0c1d6b1ad488ca736139cae0297b1a5be95ad2620348eb7246b00343d608b7689df218f64b75cf13f081cf9a4b6231eb59a98bb7bcb0414957f7418ea82c91fd855df1dc7bbe5d6979d78a47b3989d3b354b3b517278ae26a6701ae65b4ff107610004c9476d5942f50614856b23e04f0e14b527957bd2b9b1294b409aec4e268021eeaeb8e515ea161dd393971e7816011fd0a3eafcac0197620d221db2e1709a4a0b3f471e04ad2d42194936b394ad32ab1a6db68265ef1b8fe87423cc712871f017803751b3e2323a2d73b96c644e6d35c741d9364e9287c3026b12d210f46d9995bd540f8bb19c0a2a712fd06799fc248a9aa6fddecea9761af14915c7122a9cec544cb573c247a0da58f4fcaddb06de9c7a77545fbbfa9463d2874d3e054344767d900292a490f9d7c40a6583912e21815f103b6b1845ed14538a2a9e7caa5917650c8fa27fe3272927c989d1ea1c848cd03ee019f83f1e95b1fac2343db59d71bc729bf3118146c8f1fe1309a65d8b6a82b637031f8cfae8352a6125198aefdffcc2680f7ecf5f66cd02f6c2f3435be95fd4b8867528e9fb2e0d73fea4067290497c3d347ae167f33ddd5b1649963c15abd373f7a332011600d1bca2c933843c55c76041d410ca00c4e25f3a4d7920aee8f16baf7b82785191cfba870314f93dfddf7e19b535ade3997c2e07f196a1af0df7e1dfc390889549c718effda4deab1ee3d568067e3934dc4837a7289b06cd4bf00d101e7f36d6f060ff994738682526fc278fe4ec69683f20f76f827462e131f26aa1a1dbebf337b16aec7dd4a7044c4299949314ad2f8886de69062324123b6fcf91fab2336c3a78b926ee0777af615909638b2209febf2d152e2d9887ff75056e1e49d1948aaf0aa58b97a87681b608855af3914c8533976c5c8eb316978cad03b1577610de0ee994e448414538550e2212004ca331beb69aaf33ff41c412b22a53eaeafc4e4e8dde6277599b056d093cc6eca956968124b20bb0ede8abd1c19a19f2fd5c1a9bb12085ba6f67cf57de0745b599560bf8b037c08812e5ad18fa7b8fb12742d0014c6d9ea24b91d0f62bfc8f0d15b9c1cbfd6bb61298cf3c619149b4838666ad6898c9602928b287049db3ff4248acaa905cd54df67cffaa0e6d3aca17a7fed48b1141fbdd2c1a2035417e1c4dbbf66d13082904e8925f31ab4a11684e092f9e68ae5df093931f786ef0e391e99b9c9c513716843dbc93f216b5b8b55e2f95ec85fc6b1a61620ef59f879802bf33a95895049e46a9b939d5a1e163ad90e0b5a00f5e35d906d7da7ba40c5f73a48e9f489788cb8ef0dcde257735182a511ee2553c70fad854c1710e36aea54be521b3fe4c618784c002b41dbb940c4c43e7918bb0f259db8690bde56e39c118d94254191d927423d91648b7a400647c7eaf8474196cbeebd6fab33f29462ee661191a70ad5c62b734de613db46a23afc10e2bbaa388a034e9a6d51503c1d32dd55d973b9fc7c306e949c79b88703d2f71baaa3e7a4ad3d852efbafd798c86f00fc59b8840a92943827edb2828172141bcc64140242be826a9b74d6e2580a227d6774dfbe6a045868b9a605b787c00f20120728cfd50c05dcca5d1cafe4e459d91c787d51d7d6bfd9ed45340e80a2939de9b36e119fff10c1b50bd76184b7606b23e004e36ddc73c0c2afa05db63ae4a35e7ead9b150bfb986787c3f8e70a8a35c6b1d918241af1860ecc0f61394ccff1d79bc52f8e1ed2f2d36946a2640eeffed906cc5231d5ed89ead383a9271fb288eea206302a286bc651e5eadc5d62264c911d1333aa41be2eb28cec5f143aa19d16d67690e8bceda00cfe3ce46f13110591794bcef55846112d242a6e6addbd61b216822ecb05d8d7641192f698fb5f2b8d7c692eeb21b6bfb489cc3e7f50c382742959cd4be47cb8f245fc14414a62e5766980d4d9fe20acf68f3bf0f7f4525be4d24b694a0106eaf4e2164e92c6b533aaddb02d9c29eb6dacc4fe02829185d35909c02f65f694919a8f48892661676f5d50849f942f4d9ae7a8268b039a3c40fd1dc78ec94ce5adf2ba368f6cef587d5c2744c10c7d4fd762a7a92e53725f6c2e247939dfd5c108a7fd2507daba77c32c6d24167873886e8570c365b89ee8fd0a3406c2358f655b06918dc46e1e59fa72e22c7fbde2187994333c5e2edf08383ab770db4258c70a46c370574a68f9f3b855ba3ca86008eecc4ed9f62434d74f7ea9355bf39311af1d0b7b0d0b7c6b5287f3a75b550d426a3cf08cd2fde0c24923d4bdfff9d9de266ae77b61a16db7d4131c332f937757ca9e062143b67c4673c83213b95fdc4dba1948e0770e29d1a734578b48e57b6f9b876d9a9d5264bed1dd4ec454dbd9af1a685b9c96cbf291812d118ecbc1f92fbb7e4d11cafb3a7d33d37153c75e169ae90fbe8a7e952518a3b4dcdb329321b59f53f771bd507b106a8484f619cd125a19357e568e13ad4b7be4ac76510f9eafae4ddc0ca5aa6e5761769b7fc41589353d795dd2471d190a0bdd0e18749ea94f270ba7ef44fe52c1b779207d418ab87b7f00572b2368b814cee914d095f534ded5d65524aaa31959d18e7e84495a7b52dc5813f03e041333b1554afc6730e11cfb83a1b4a22cbd0559f48e24d283c1d4934f26cce935232d546737076840b80891b257478f9b420bcdab89ac1ceb811764c8dbea9156c781d7ed14000911a5ee7adf43b64a55cc8b83beb685574dbe52d4ad19643399b18f4b4d477caf76919964a3359a1ce68e7406ab86ded9b03eb221017a6153145e20f49d54462cc67ec290794aaf8172e880fc76004525339a0ca9816946038305afba4735b19343b97f06de3381d91f9881a585a5dbdb48a32f4a3e9665330711ddb5b1fb3a13f362231ce6a0e8d5e259590729a59ce1c1845642e141375b3357d01ddebde18abfda8fdd27aa867f95c82443f3634daf6ab63c86d3fc5dff641bdc863eb394fdbde3e9d84d1b78a9dced113de55c0d32f6953d238d106522c186b8773c210de1b49b3a69c78b85fbc93d5b680cd8124ac007c24e5422ae91f89436c32365c5557cf36fe4b3a2d10ec52d17ff81226ff49c23550b865b51c2c6c01e13766512da658f298fc43aec61135cfbb31f0b46768954b7044b1f963c899d638823deb572510708512722be18cf5ad1e826b00da5091339dbd959c1bdab4390b55301482ba0a33594171b07986741d68d080c8a8c6df3d4e8627bc94ccbb11aaeb613719cd5775fae975060606e8445b12604c298298d4b32db711e7efbfafd0ee404d730037724a93952fe87d743c155a2d5d7af9c19f3c55c7d38992ce14309f069b55d4d19648a62e0a2076ebc7d5221bd78a986f22163351f6396c2e6f9ef4cfdd1acdb46bc48ca7d546375833d3198ba62989a301b3bc0f3afedb3de0c457cdc6d077e9fdc99a479cd52aa5265c542a8af20d1cfcfc8f7a4e0d622f9df6c4a7e899fd6b91ed8ac3bfe7e80cc1a12a19b37969c3a2379b59123218541b163ea2773872e91e66a5b93af327f956b0e11d0fba0f3696cd12c11b314e05132befc27ba1e4bf78e191f8fa4168a36c64e6bd85995eaf377e3ad7c4ea14af78d23d485bb001e0657771dfc97b0db40b8c53495ed21db87996129f9a475be8e78e3056d318817ec1ec57c8af390677cf6730e2a2a0aca1021a5138056818c86fe098a53681b691c1fd2f8de575732ad86c8afcb45fd017d64a320c713a9194c712e4d5cd16c0baa0f08031ef445ef1cee2294e9df933131889e8901d988bb45a11cef7a442172290e42e5477244b5d722ffa9ca8cd8bdbb26b0960178316e87d8a479d6a56c03baa81ce4704dbdc33336c4c957b0803413dcace9115ec00438435633ae7cec32d6a3ea043b8ced5fe1a9be3bfc72348ef1e03a8d0a24a7c6b5598e74d7267894634d1f73fd207942f751b4e06c1b5742a102157470526bd7a8493db47eb3be2514823c1d99de62fe46aaad2f1afb4555d50aa397b339204e3ec8dba4ea073e29e3d8c184e71273d08f779f9413133a9c51c7f71e3e489ed4f83149755756cbaeffa438c11a19bec36213071514e0d50e3d04824dc12b22094d5b3cdc20681b75612cfbf38128812e5efd983310f4fbf957ddea79219df03fed2bd3276c19e20a55dac2f18789b1cc7c9a43f1c629e13b66ef6bc01de19f25f9e112695e27daf2224589903808e6eeebdafa62f17f2c5e251dde3c470610a3bc2382c29a048bc7f15ba72a3e75d343426adc109646161c4e1264deb32840cc6b26269aa904f1d46b8a84b35a5ccff92c7b9b3623f8f748632b44c354d3427321649b326a0bf110607aaf5073eed237f1bbebd8eb144ff9488d38ce41bb63a3afa995d4a2a129d63b40653646e5b9b6b94dd9aca08bfba795b504d238fbf2c4034e74c64e325e312a6ae687c355d2d59b469d22ceec41bf25e351b510bc63b55086e78cd114fedb65b5227ee4720662c11390d2c94243a20fc255f497f7e710a642030564990ce7181c59756cb2046c36603afd5277e3f22bfaee4247091637cb86249759e193fd5a38e7491775134dabc290deaf5b285756c56650a4e121325f1a2856335d8bd66e2d20fc308df52d92deb86ba12d35bd4f8fe4a904c73018e45e595655b8b8402b90f7ab51f8de17ee6bcff02781c2acfa1b21852c8ccb57d1d1f471dc90fcb1f0800fb511119776a9e52df3e2ea4004ed0d63c0ae33f30b7b48ef9955d847269c3392735a2e1a454d6ee59247d7301bb775cd705bedac6f0f48c1b1d2181f5ef5b52802f2b13dea16b72fe0e2a574003440df57d92e2c7b1fd8fb1bd58d1155416200eb9372baa960fdb50287166ad4e6094cd5b805c0452a9cb77bd9076b277bd0463c060bc7778746d617199f355daf103b98bd0b86fc9d7fd591541d25e39664bb095c06cd784ad29b39", 0x1000, 0x40}, {&(0x7f0000000540)="3a7e61a9e89eb046cad1898351b9e779260f8030f84e384b2f57e3b76da6429921cce3586506248583378a9812816c32b594adb3284f208036f31f2f9651158df01dd8f901d52d170174e5f283ac598d137ab631cc33e5f108ef21cfcebc57bb22b5539a2ca8c7f76eb13160943840f9b5fc3575", 0x4b}, {&(0x7f0000000180)="380111469c9bfb866b73088e9638ab9ba63b2928cc2ae6d9eaaa7ee5a9c960838a39797dd635245f01010000000000007ae3905246ab651e360ab1e63024865ae37a3041a6f7166a53f5d258a4b1eda5144b3f92bb71bb799204495706d5af01dd80a27e38f9d0cbc5009698feed90e021433ba1a47d95dd4bc6e81accc5bfbc1eff245b6a1b00000000000000", 0x95, 0x9}, {&(0x7f0000000240)="f28a6de04cd94650df6036b6c234feb3d258166fff0dce13f49d8d02439263589b687663848655c87548ec5f33d8bfa90213334e5716df688ba03dc99a89df84894058cbaa58d4503baf46dad1592267427ddf5d4ef0cbede4b14f4732529849f52d2b01c1443e", 0x67, 0x2}, {&(0x7f00000002c0)="aeae3e98ac20262fac623e7ab2e9f13b632f1059e4a5b7c7c056b49781b8abde1c5a75a57b510399ef8a8e6dabce457da5cc842cd8a4e2dda43f8539b6e16626a306be784a238d75ed8b70c03c64d838881a2fd4cda41be1bc9a7f68e0cac253b61b702533a4b60582953076e4e682f4dceecabd7805a0a7ed712c1a0bfffa3e5677318feb1eadc6d3ae3e80691c1bb535e684b849f05fd2fa146fdbc0c7dc2bb4946f5eb2e8b092164c5ca6d8befc994b175207b5c6803ba58c1f7b9a2b821923b775c04b0dc7408fb1cf42c13732", 0xcf, 0x1000005}, {&(0x7f00000003c0)="2bddbf54a30901e6b2383a264f5bc9dc1c64404e764a3076d21f926d97996093b7f532650eb194a8ad38771dcd2cb7c31443b170f1", 0x35}, {&(0x7f0000000400)="e431b7dbb6774539535c52abebc7697b31853ed72963204e692e4eb384dec40e6365c74a20c0f1aaad43c045fbed44", 0x2f}], 0x40000, &(0x7f00000005c0)={[{@dyn='dyn'}, {@flock_strict='flock=strict'}]}) r6 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r7) ioctl$LOOP_CHANGE_FD(r7, 0x4c06, r4) 04:19:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c006000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4003000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x14}, 0x0) 04:19:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xc}, 0x0) 04:19:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4004000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0ec000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4005000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x15}, 0x0) 04:19:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xd}, 0x0) 04:19:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00f000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4006000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4035000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x16}, 0x0) 04:19:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xe}, 0x0) 04:19:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00f300053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40b1010000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x17}, 0x0) 04:19:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xf}, 0x0) 04:19:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={r3, 0x4}, &(0x7f0000000280)=0x8) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba7502f6c59e7f202738f6e3d2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027eccaf3f6db1c000100000000000000497400000000000000069e735ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00120009000100766c616e000000000c000200060001000000000008000500", @ANYRES32=r7, @ANYBLOB="e86c1e1ccfa0b0"], 0x44}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r4, 0x124, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x2}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r9, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10020000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r10, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x120) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r8) 04:19:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000000c3582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007020000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x18}, 0x0) [ 370.130607][T14610] 8021q: VLANs not supported on lo 04:19:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x10}, 0x0) [ 370.186154][T14615] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 370.330203][T14610] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007030000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x19}, 0x0) 04:19:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x11}, 0x0) 04:19:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1a}, 0x0) 04:19:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x12}, 0x0) 04:19:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000403582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007040000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000180)=0x7ed6, 0x2) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x401, @rand_addr="32f558271399e1846424a679277f7b8e", 0x2}}, 0xeab6, 0xff01, 0x4, 0x9f6, 0x42, 0x8, 0xfa}, 0x9c) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x13}, 0x0) 04:19:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b}, 0x0) 04:19:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070a0000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000001b13582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x82) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000200053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x14}, 0x0) 04:19:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070e0000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1c}, 0x0) 04:19:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x15}, 0x0) 04:19:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000300053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:09 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000010c0)={0x7ff}, 0xffffffffffffffe5) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40000, 0x0) mmap$snddsp_status(&(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x0, 0x13, r1, 0x82000000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) close(r3) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r6 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) recvfrom$inet6(r6, &(0x7f00000000c0)=""/4096, 0x1000, 0x40000000, 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r7) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) exit_group(0x4c) 04:19:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070f0000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1d}, 0x0) 04:19:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000400053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 371.740388][T14699] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x16}, 0x0) 04:19:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1e}, 0x0) 04:19:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007600000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 371.836316][T14699] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000a00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x17}, 0x0) 04:19:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x4000, 0x282000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x3, 0x800) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000300)={0x0, @bcast, @netrom={'nr', 0x0}, 0x3, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) 04:19:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x21}, 0x0) 04:19:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x18}, 0x0) 04:19:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007f00000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x22}, 0x0) 04:19:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDMKTONE(r0, 0x4b30, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x19}, 0x0) 04:19:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40072e0100053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x23}, 0x0) 04:19:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007ca0100053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c006000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1a}, 0x0) 04:19:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0xa2001) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x24}, 0x0) 04:19:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b}, 0x0) 04:19:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000300053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00f000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x25}, 0x0) 04:19:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2, 0x200000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140)=0x10001, 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) sendmsg$key(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRESHEX]], 0x8}}, 0x20004850) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1d}}, 0x10) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) fcntl$getown(r3, 0x9) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r6) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, &(0x7f00000001c0)) write$USERIO_CMD_REGISTER(r6, &(0x7f00000000c0)={0x0, 0x2}, 0x2) 04:19:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1c}, 0x0) 04:19:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00f300053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000a00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x26}, 0x0) [ 373.623181][T14800] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x27}, 0x0) [ 373.809946][T14812] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007c00e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1d}, 0x0) 04:19:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x28}, 0x0) 04:19:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7726624e, 0x420041) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x78) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$SOUND_OLD_MIXER_INFO(r1, 0x80304d65, &(0x7f00000000c0)) 04:19:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_proto_private(r1, 0x88ed, &(0x7f0000001280)="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") ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000040)={0x8c001, 0xd000, 0x2, 0xfffffff7, 0x1f}) pipe(&(0x7f0000000080)) fallocate(r0, 0x0, 0x9, 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:19:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x29}, 0x0) 04:19:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1e}, 0x0) 04:19:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007012e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 374.425095][T14849] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00c00e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x21}, 0x0) 04:19:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2a}, 0x0) [ 374.521924][T14854] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x400000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0100000001000000b75d4ac6975fde1c1a9fef"}) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000000)={0x6, 0x6, 0x3, 0x3f, 0x3f, "9e5f15fd3d0352b5e811ab134e4acbaa72ec0c", 0x1, 0x883}) 04:19:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007003f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 374.784299][T14869] sp0: Synchronizing with TNC 04:19:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x22}, 0x0) [ 374.819158][T14867] [U] è 04:19:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2b}, 0x0) 04:19:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007004000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x23}, 0x0) 04:19:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000040053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 375.138287][T14869] sp0: Synchronizing with TNC [ 375.175771][T14867] [U] è 04:19:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007006000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2c}, 0x0) 04:19:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x24}, 0x0) 04:19:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) r2 = accept(r1, &(0x7f0000000100)=@x25, &(0x7f0000000180)=0x80) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) 04:19:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070ec000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x25}, 0x0) 04:19:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2d}, 0x0) 04:19:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000ec0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) pwrite64(r0, &(0x7f0000000080)="cdcdf39a3507144c874c671396d5fa4abbdee365c2cbbe222d7291357dd49e49aab266e031af80c796ff2a603ba549ad91a817a33b9cea99eef71a6421952718088bfd2504478621089b24989aa46f0e8f0a0fd8fe9477252f9fadaf27a91dd909d072336d69dd55567e07641e9edab5702fc1ad3b489fea8eeec6b23fd21e9c24751af55e6348e7059c92c1281f1b876100a79fd445bf5c09309ff1e5b15f535e944ca364f93f78eea4d6eab40ce5097f0210712c046ac060e786ac63a703798a", 0xc1, 0xffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYRES64=r1, @ANYBLOB="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"/905], 0x3) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f00000001c0)={0x8, 'team_slave_0\x00', {'veth1_to_bridge\x00'}, 0x3}) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200000, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r6) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:19:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400701ca00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x26}, 0x0) 04:19:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000f0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2e}, 0x0) 04:19:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x20100, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8, 0x28000) 04:19:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700f000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x27}, 0x0) 04:19:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2f}, 0x0) 04:19:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000f3053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x28}, 0x0) 04:19:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000073582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x30}, 0x0) 04:19:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000002053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x29}, 0x0) 04:19:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000006180)='/dev/null\x00', 0x0, 0x0) r7 = gettid() capget(&(0x7f0000000040)={0x20071026, r7}, &(0x7f0000000080)) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000007300)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000007400)=0xe8) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f00000001c0)) r11 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r11, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r12 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r13 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r13, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r14 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r14) ptrace$setopts(0xffffffffffffffff, r14, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000bf40)={0x0, 0x0}, &(0x7f000000bf80)=0xc) r16 = getegid() lstat(&(0x7f000000bfc0)='./file0\x00', &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f000000c080)='./file0\x00', &(0x7f000000c0c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f000000c140)={0x0, 0x0}) r20 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r21) newfstatat(0xffffffffffffff9c, &(0x7f000000c1c0)='./file0\x00', &(0x7f000000c200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r23 = gettid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r25) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x2110803, &(0x7f0000000380)=ANY=[@ANYBLOB='user_xattr,obj_type=proc,euid=', @ANYRESDEC=r24, @ANYBLOB=',smackfshat=dns_resolver\x00,fowner<', @ANYRESDEC, @ANYBLOB="2c657563940f", @ANYRESDEC=r25, @ANYBLOB=',\x00']) newfstatat(0xffffffffffffff9c, &(0x7f000000c280)='./file0\x00', &(0x7f000000c2c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000c400)={0x0, 0x0, &(0x7f000000bec0)=[{&(0x7f0000000040)={0x1c, 0x28, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@typed={0xc, 0x1b, 0x0, 0x0, @u64=0x80}]}, 0x1c}, {&(0x7f0000001280)={0x13dc, 0x39, 0x4, 0x70bd27, 0x25dfdbfd, "", [@typed={0x8, 0x46, 0x0, 0x0, @str='GPL\x00'}, @typed={0x8, 0x85, 0x0, 0x0, @fd}, @nested={0x98, 0x21, 0x0, 0x1, [@typed={0x8, 0x1e, 0x0, 0x0, @u32=0x7}, @typed={0x14, 0x65, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0xc}}, @generic="692b39bff8d46ee517ba82c93372f756817deb1684348e87595cba34fca7d3ed251140a4ffdadd1ebf0e0e10bbe8506e4ccc3477f3a0c032df612e7de2cabfe1548f72fc9aaa14e76e88767cde4ef1988247d0390a2823cfaea2ec80acec3be1", @typed={0x18, 0x51, 0x0, 0x0, @binary="25b32a3c1ee264780267cc2243ccb31ee6ac45d1"}]}, @typed={0x8, 0x3c, 0x0, 0x0, @fd=r0}, @nested={0x199, 0x7f, 0x0, 0x1, [@generic="569a1af85eea2e84f6274bb41aa4ef090f9e4540d3a7ab8d66eb7c1b059b49900034889e3434179ba11efc3058f3a64d643d7573c329e870fc6db572218a4ee5e13f79f5ed7e1736be43e27039c026f9", @typed={0x4, 0x80}, @typed={0x8, 0x54, 0x0, 0x0, @u32=0x2}, @typed={0x5b, 0x1, 0x0, 0x0, @binary="bb00f91ebd9a73b516933df8764bcbf043b0e29e50366b65d0dd82d76828bc0518f28215e33c7efa31127ba5992204d7cfd0170d0fee19c47c05d51df2fa886a3da15ec7ac2c2904738a074c728a6c7c49b3544578b3af"}, @generic="a72266b35445b8bd208499ce9504f6993b72cd159a13719cbb09dc34257d307fa6956ad2bdcc9ae11ce013fe1190dce9623fec7cee4a0d82784e27b0f1051b8d133d97f57f4903ebfdfc644f8092c14c49753a7aa2f1812902c26be9ed87f56cb0d17c8b079e776c199a11aed8177ead222c494df8745f4901387d84b8de32015f3bec24bd9482ee1276edb27381f005976bc7729428ac64c88a9a0e190c5a00781cf17af74f458adf65b64c193a20c78cc6a107cb6b89b64f842ab3cc11a27d6d0409de60f852e94e16eebee5799649b57c4d4d1ae5ada75297e63a64"]}, @nested={0x117e, 0x41, 0x0, 0x1, [@typed={0x19, 0x59, 0x0, 0x0, @str='/proc/self/net/pfkey\x00'}, @generic="ae38021161a92cbf69231da17957b958af270d77f86eebb7dd4f03c29284f197773a8ec7e357c7b95497d57b67000eb7a487490cebb9f52273b8c3564fe1b256eb3b", @generic="7ed6e3ecd9b7cf5d2fc9b1767cc966f42fb3c767d41362ae7bee64c886934c46e033f5ba0c6d03dca038cc27b7039b77825e16b59cc9215b1bfcc4a12b916a", @generic="797b5d9e", @generic="426022ab08ae067eb579dfdc2ecd33c72fe61d9840da6c6c209c071102955d3403fcbfb2aaba2a5631d10f97c75c8cbbfda38e9fbd15a8d53aae51f0ecacab02ac3d0241ea8a5485eda7c430d73f880be279a704f44e5904ae8382d0312acb4f7090b6fe8ce72ea80c00a723b1add8095e2e6091a6acaa6e6f", @generic="d654b57ab84e584176fb88ac751d031a05bbf1b0c31e288ca9e4df212af1d0d0d218a5cf02ecc98ab63461065c9e8825afe28b561ad333a95c67ffe642606015168a037b0bb6c975436e53caeb522c9f2dfc4811df16e0cfb52a449b521a7abb1acc1fceff87335d8a89e58152000b541fdf9f97aa15014c34341b1d18c9e87368630378fc0fc2b3bb6d545843f1f56aa7abd087c86a1114b1233c19bb4d6f5f2631b930c393369d2b0226b6e25b17aa0383be5ff76ee5ac39a026db28ad5c17363fc8a6550f5267b73bc3ca0284fb49654bf6ad3b29c1ba201c8cb4c0dacb82c5592d9b81cf2c1b85e453f17075f517f9de8e93da0a9ecf0be7e7a7c4fe7b9f72f637b76e157a79ccc674373411d34a28600b04fee20224521978f6b07efc631257a540c6b1dd0d053f2e959d783eeab680c0f766e9262ece5cc1d163291f45562f1bd4052c6d1e94483f73abfe3d960cf5cf9bbeb9efcc87a418808954754a40a753016a8e3dee46ae982f53306a7d7eac50116677c1c2256ee1ac3ba798e0d087e0ae4e4e9c4a591fed11408c81acc9b845b5cee74be494fbec2a3b2fcbad3a05da9a383fe6db7ba653efe1222183c1d4aca7958c19c9e971e259ab9c6785addf23f72c1e25e948b12385f2de492638925ac46af73ae3d1ad3fc8447de1999774c5380e5ed5ca69269b412da0b7f950f8205c829e686df5f251748e7787f7ac5713929099bc4889363d1878d49542fbffb1355bfdb5378f749bafe58601bff7d463b7420024ecafa79f669d75aed3a29b6388ba6eb5d15b5f44dc1820486f1581d030871ce8b315fd04ced10b4cd1f32e39790365be13ca3fb7ae3f2abb14eac26f87e916fb65c70f518d9d8c6f7a063257171f921be6d326cfc32023013c96247c53fd300178f686753d4bc3cc47c25cddfb8182f8f8b158053072a0a19736cd33516c985c8e53e7c5d77c68cef8a98217bab0190e9c05bf41a6095cde3b4fe0a3ac2fc8eaa453cff3355ab7f186654d76ce0d2d6b5a1e64cf3b4edb51b28a3c0a56d32caaf551250682b93ae8894468fc8ea21f7286eda540568f9dffdd2a0929e3efb93c946f1ca833cfa5228a7b6bb60a017645f6e8b01266c6d5ebcc82c4a50744ad646c73523f9d33e0cf670bed819ee103ba44093c5b5f4069f8732dd037e458e6893bb6af51b4510d37424ea415aa3b26ecf39afda4c9cc4cabbfc82be6a78f7edf8ad93f76ebc01375e474f5c76e69eb3b4d7f4005020b9af081d2ac721ec8fca0202601bb6c3c5f0eb7bd561be23c245ed0d4b857d9676a092377de31e227eea08c41f0ccb02eaf36ae8d0668f20a5b64e3336b674f2cf2b30fa0fd848148ed07544a9eef95d673da5ce89ff20923f18a0f13347b2eddf397c20d45fbc51ca977c5790c750fc7cf871b6bcff1d93e1f103ff03d5042b285e7228e1f0234cd89faed2c41942179b020c1b2d7b1be7009822606527554d0362acf699e62e32927608ea80b35044410fb245edd880ffe7e91361ab21a831b157a67dbd1268ffcb6cd246ba47e8900f863486c4e2dba83c0547e2d0723df2cd905e3996136a643f86f752ad8161c9d628fa7be796041a544b66eff74ee5c72c1d26cb8d7ad096e8ed8ebf51ea6a377ba6d931d35342d8c7dcefc806addd48d85cf23388e87a3ff25d874cdd98629e5b43cfd51b0583448e5026bccf89f0cdbeac42170fd8e520805c12cf385f805dc9b6cba41f714a31463d4db7a1a6210b9d7b0708064f2f039256981958872c6f2aa3b5a1eeb417c4714a2291d7f3ce7af6867bee89f205e719aae6326b615cdab807e91a5a6d9b34ddc26ffad6ee79e7e57ec70a25583e0875aaed6f5fa88d00bc1bc8f1cdf6c6f1095817ef2774784df95c2866069345c3ca974e25c2035d4be039ebfd0d760c8af6e3dbbc9abfa0d2600d58e5195311d73bf55c39ad63bf2844e63804e506b371c89ef58263c3fdcf2882e126b6481a4ef09b129c13e12223c4128de5a3a768e0d29d2e127517ee70c6f2e9b63551a8c1316b985abd11f2fe2c4c71dc84e38c3caeb19737271a25375907304283857e7b3276fdbaa42e45f1f51ce3916376bf73d4453406cf887049fcc1d3f66b415dda0b484fadd36879e6fc78e6ec79c472f1498f53e39ed62da31fccdb23850ce686be7a1e41ae9306b97e616f5c451912bb9d57ee1cf8e0542bf5e901e8f292722a15530719d9c04be1258b4d50f945ea7d21269c10a712966c3a284cad517a48919885afa8a68860f5467b12d555242727b4ce86420ac63e759a5262dded30c2e52a95c6afd5ecd73bd47c187650254a127f5e65b16102a0b28af1ecc1fb133955e7d1797645b4083eceeac8deff4747f228040cbdcdbc22e37b7a904b080ca7245db4e3e85a5da7edf6fb79ae9900f9d4d6895e68dceb04c09e7a8617efef47cbb3961434c888e40b50537327d887afd2b69966f50999e5721f2be8711c441da86162f495e139bffbf0d5f3a759be1a25a6fb00464bb0a14233eebc7fc4f404655ed0dc217c016478e6df91f629085164d6d526ddcb9f50c555c0787f252a39a317a017166c893e1dd2c19d115a3cc3b867531ab8bffacbd96c3c93539028498cc3b93ff4a7d371b10fffda2b51694eb9dbbb1777ac74f3677bb2599cc76b0b30c2ab00e1b35790e68d836cbd3b8865a0a78a909d8e5fc4bcbaab763dde8e3dbfcd5ccdb559ee135cde53f3bac8c20432adffb0a0eabe02019af740cf72350b02996639cec11b08032d67679dc10497ae1839717ea80b2017eb5fd09301bae825da22b30bdc8c1359a6c68f6b1ea361106aa92877f8b6481c8e417a297ff2d6907dc9357ad63bbdb994ad018c288534e0459f7569addfba86feda8c38f8f27f5b914f45cd683eaecd9eb5bb31635120b326e607f34ba138cd702712257ba78383ebd49fdafc119155d24951ebf5e4ae1de85bb6e6aeecc33aefb6b7f862b816df00a6f0ee1129e1b84253190d280329831c179cdecac586918deb136f3837f00d33f9fcb61ab32e71c8eb1eaeb5ea269898b0b809d2077396df8f6c6f4fbdb27b03aea47a6dca40ea4807fc7f73b8fb5ee6597d74c7f04a5d851af1552501539cb84da867294ba3488caddca5e3995ccfd11fb834850f90a265804554ce93e9b233eed9475b8f470493f3d620b84bdd57843fe4241e7d4eae5b93887a7e47f948e1d41f6e3c00e516f757106970b7f50ea47a86f336f91f292424e81998dfa992a52977dfb755bdb17278891549f2c755d4efa812b87cff3d4814cdab20ab2cd4593b2ac07c3fac9920f35efaad1b7a3a1d52c9a964e183a071caca7e30139d0f70ecf1a8205ed8b400d35e11b67cedcdca00fd4c9eb27c15a70ed2edf13c787863e84918d03f3e6d712fd13c6789acd6e26ac7c8557b788432416a43d8ef8d4e48afc72483102556587ca0c69c136619de1e57547529a3ad16db6b8ca7bd45cf08264e254849b15a4d5f4652ce73cb3f57dfc554dc1cb32f0ad64aa410eeda2f6ae2016b9c25f62e25d24d70ed3434814cd48c67a7204c01a01a31a4bef60b9aa441f54e0221da1cf25f4e414c828aa74892750a2c3e02800e381682ae7bca8e64de39581e4f0c3c909bc2b91e207dc1cc16a82feae77da911530b8ad02218918897fb849ecbc6a603c78fdc4e81cb878d71a31386c44c2ada9b2ccefd83bbe80342cdafe512ab185d8356f2f364f3e2aee6469f77dae5c79e9d0c570425c88f0d1fde558b4d800acb5240363f21ef9f6e7beb84ba190cbe9483455ce3eb0d88ab7235b3e9e6c15add943d603886fd65a9ff966601564b050d1075038ea2f266b0cefc788e56e1e5f03fe8839fd14051d6a4f518eadeeb3f4550be7e8abe710f295495e0080a9e7c1a1984f08e378762d022fbd3730fbcc5ad92318d2e9fbf383fe14eea31e80a84099c89a56dba44e1e421b6cd3e5c7f5f27f3a47352902f42f4e1099e55df768f2deade0a2bfb4babae2d02ce57bee161bcd5e0814cf7e2b1b0a56df3af21ec01acf783c3d6ad799cd16cbc09f1dd6a22399c420e2447daad6bacefdf246bdb4371fb049d86e28250529a4604a8f44bcf4d359cefd2acf7a91c16c60df5259c683017b24649cb7bad7eb52286c28a8ac82f98fd60e15c0638ca893c67c456a22da1e38df2785e252aeb752b9aa57d973315a8127d73c5966e429b97b6c4ea1a5be86b222b807c60bc77be1b9b2b0a7c88f4c31de9b01859b44a1fbdd558294c5c5f269d25f837855369e12ceb5b708ec0cd845d6de01b85c01297577ee3a86615425e58dda094a98d469745c413d595215f65293162a3795d0832470f06efb6ccbe6e4672e72ddf8712ba35d5bb08fe7165788eeef8f61ab69daf989ee44ddd1733fa56cdc571893f963d0d0513eb338c1bde9c32b9d2382deec6bace2bcbfa6c7187ed8e80beef134fe0a70c0d36fbe97b987da3194160f72e9be26443b530dc6b0ffeab10507ec3bfb436a0f562deadbb3b928278626d04356a39c15299308e9faf654bf2ace383aa7dacc32c10817cc8ceb27b762446387da92500ad4095e4b67c9b05d277b83554993b1f91aaa1a8e8f4c2364158fb7ddc560396d8ab0547eb35095d0b9fb7b82035a477ee64d7d0ef9473711105c030d59fa506d22cdb6c650ae485e4dd712fcfa90d58c53ead6335b751e780930b6a4c430fd41af5cb856137f8c902b3055ff20d5b31ddf22efc1d6cecd131682d08dba89a4de04985188afa791d267058fae989830baea1137aa97587856d74b9c920e5173efd2e6f3d28a58409fcfec42c4fa583e91aab1b125025fb302ebff1d3f4498f0cdb83c619c449a2a9ae64ed1f14315a3a133516fda25b913ba303022f691db7d5d2d1747b953f0f792fe20f4e60e1642baebcbb6a1ad1ad9983cd4a4f208a5cd12f07540367dd5c395df884a8c2b3adce04e91fd32a436c7db2da10c45c1aa720353e02e1b09b3b1c01ccf66a230edcd611637324d0e8a5eab901d882416c9d78ce809279c47d96fbdf4620abb6012a5a84795ff1047778585b7b3bc3bb676fc232df8a95de67d2d253f15f831867ee3ade978eb0587f11a8d15c674f7fbfd2a35b1a4e7e12ba92e508b6cb86fa0893f5be6f1a529ce8585928ac406b9230f876a404c655d90243281a06f2006076a93b14825fcea241e6f6ad664bcc5e96a49ad8d167d980a698e25e0e37049e3a2f3a05d9f53b9253389b9fc91b8abeacd04e77e04c5af8092956bd3c32a86c7622cbc1066d904a3161b94b680ffe051baf8ff7a9293cf208603e4872d09a2fd7965a081ae0cf9be570657aceefa334b517f18335c57ad328fe8cce21adc08882cb9c9303dbbe2d531da37e6ec13bc45cc02f6f41e202d4462498879c8572fffe2fc989500d5b3876e90d10257e9e44eb11c79b1a6e166daf8d5ac013b0806cf676f17ce478738a909e242b4f6f2bd91bfeb6d5e3df79f561dc2d48891487752427c10822fb3e12963bb3eac8f791169f1f661299db8f5d817e3d26a9dc10149f99cda55177fc0d2ae9c3cb25614e53604ac420e017b106ab1af9a9b2c64dd9a9c8829cf7cd85467d77ca4a8b0702bd28780f839ae280261b605f1bf8b3f50441b87eff9b6af5c07f8e86cb66f5638d73b52ffa30439645de3b6eb81f845f939904ca3b12bb7952ed388eee3a46d4e3aed461ddce34a5193e8f1eca67de03e49eff2b269a2377d67454918fd05116ee30689e7e178f70fd2ccc4d958dbd321d38887eec2abc0ce471dfb", @typed={0x8, 0x34, 0x0, 0x0, @u32=0x81}, @generic="2b916b0aaed9869ca1d3034e0e80cab1426bc2f7fd6390ec5ac9ff121b9822", @typed={0xf, 0x5f, 0x0, 0x0, @str='/dev/loop#\x00'}, @generic="cf641aaacbfaba9821afa0b64bda230e993df728adff6d5d9c9b8627d87777451dcad3fe74663d00d4"]}]}, 0x13dc}, {&(0x7f0000004e40)={0x1340, 0x2b, 0x100, 0x70bd29, 0x1, "", [@generic="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", @typed={0x8, 0x61, 0x0, 0x0, @fd=r2}, @nested={0xef, 0x16, 0x0, 0x1, [@generic="06563d92d0aba4e410a55a6dfee74fa2733b94c156955171edee8f3dfbb2b35f03b49acd227d6ace5e0eb2ae95aa288e7995c7cd22eb6910edd88187bd50fad8cdac213cfcb2d6404c6272a3125e58bf2d10b11f34f9374b0aff5fa207c98e85530c2b3dfc0bb66bc3a84c85e1f13f0e339e51b1929e42464b40bf8ede4ac3e38c8937a2d23c693cbba9c7d7a541c88783f67b1e6402cb028d727cdc6c8e7a68ee40d0b01d3c5671a1c02cc3c3dd2cbe55898fe37485d3abc8402f96d282d2e2be861d6ccb4563598c80c3eb29ea87f5724a35aa0f1d97e3403ebc4b0710a7704845d5", @typed={0x8, 0x34, 0x0, 0x0, @uid}]}, @generic="7d56e34ff9db2b473f6c67d357cf766b68198609a43d68481b5b3dfa3e426c417b51d83a2b063438f4ef1add85c2b2297179f4ac7ef07500d95a20c05db0946bf1c00230ab1a734cd80b527b634c6439b0cec5a662c8dc0d544d94d5028d8b2893c5d28904d37b0a214bd2f8286407c0a9393e4d85c45b6a5d49615b6459d20af5111f1ff2ec638243f2c21b1b60a38735bed7b1b222b0b01c4b43bc", @typed={0x14, 0x6, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x2c}}, @generic="a064f7fed9ab3de5d9fed7049ded5bc37c9b0cc83e3c8250dc283cb77312f32fad0333ef9113c42d0024af9f899d1974d1763cdb64c55a41c73abefc74ed142fd205cad1c101119b0a0924173ea425ab713ef22dfabd57eb04887593b3b7f7c1f624748693315bd0d40e71fb2af98ebaa9e43f96ff512ee65a", @typed={0x8, 0x1c, 0x0, 0x0, @fd=r4}, @generic="ba69766ef14c84720d3d27c59c22d1f796740896cacd1c0346da998b31a08419694160e95456ac2c7a49cec775c6cd3f8d0f9441f70b81d6547b80627e884d3e47f32fd4c9f45122c0558f79df148a25e255e814b009b7519b1fd7921eaffb376c2df80d1cc78318938a16957ded9ab07d8bd153c1ab7d5e", @generic="3eefc47c75a32b015e884132fdc8f58ce30f8ba8ed25b0e249732fa631575e4bd5391e3d5dcc256e0bb211ec31c0724b97b252e85a2629b0cc7fe02395542d38890e7de183bfe6025cf488e06b97eeb343d4c69d20d6d41d96d13b6d1401dceed79da30e7fc4d73f16396ef195aaeb20903e5f34643077e4e3b1a4f59e5f4da5cf761ba9045ad816633cdc4e"]}, 0x1340}, {&(0x7f00000061c0)={0x1128, 0x1c, 0x20, 0x70bd2a, 0x25dfdbfd, "", [@generic="b80f323b593077fe2f0aec3749587dc1c52be3ee7f1f982f72bc06bb090d825ca0a8619b09", @nested={0x1005, 0x38, 0x0, 0x1, [@generic="41da3a6ae25a064c78c86bd95acf1e7b2156cedae330f914ac3d3d858a617518fe1d8edcb77f0ca0a24f5c9eae8bca7bb633a095afb1e0b254e887e99b417ff5f1363334a0515bee3bd8a6a65a6eadb98d597959c4b6fb70e98aac4d0da872eabc9c43eeaa1da50b8a006b4413216829b7198d4973cfd6efb29ac05a7cd916eb8b63ca69d3afa433db4487512074480be4c5ad158d92a094688cc1635f9aa436def571f66dcb675dc49c1a824a61292958217a50704ead64d7347a1ba4a8abcea9abb4350ecc068e95349daf410c976558d82e58ae45646f71fba5f6844f8566617a9e051d2d40b69bfdfd381e0cbb1908e631cdc7df785c749c74c1b2447be2aa19806d4ef8c7e7b5ad23fc372619eff87e010006052bfde2edd101a328ec22c2fbf05a0b83b5137ded9e27dae00ea19348ec55527d4d4b2eb2e39e95ba0da0cf32b4031338fe1ffa47185cb29093a2b647c5ac13b5db80d090c1ba576425fe54ad310b7874b133dc1782ba6ad42b8b7e46b3d96c97b7568815d1bf06be9ec6b80ba5cc38384b4c92dd9b1ee2bd0b14b481f0ad795e5892588c27d1c44f1a7a624311834faccffe608efbcc167086d5f6514009a8c0b4c184ee4ce7012a84be7d8559045fed303024bd36d60f2c881765975ef80ad56926646a5233817c79ac6735c705f65253e434493bbc2ff2401b114d9b2e437d61a5e712e1e0e9c2015a78568b0144e3897db74cb3d8fd8e92bccc46e70f0b80366563c297190b42b5e8e103f2e18a03c48c35ccd2da14fa4da531f436498a8382e51e6925e87f58a2d4cd77376c75ebacbf08356dedab1717ae4931cdbebc813242cb888df1f12e7bd57df1b1a806190154493b691c8a75e047552387153c72885e711a9d0c1cdfed2aa80c236a59783859a6e4b3804bd03955f958a0547d19eb9f341ac6376062b3fd4ae7b591fed44c936aff32823f7108a8d3db9cd63a4b1cb9890ddb0875895b42723a3fea264ecb3ec2f032600869543bd70bcfcdd336dde2cbe417b3b02518147b2f0132a7af09456becbb72a8c9885e72154a549896e7bb70f6ad9b56d4291f10824408faabdb264102942b4112ec597bf3a7fb4ff24760b231685880a95c3c67817bf6dc110ecb9a0072d826a3a80dc10f5ca126ef733688dbc3562a9a61af20d0fa5377cb3a1de21ba143f43b71aabafe44fe4bee47205c7df61f3127f9c1c8ca9e1bb68468e8f0ef85c5180a1e74537ef1b7ad3217e3411a3d0d447697a242457d9398f286064c104177ed2b808072956276e7a6c4660b8a82483a59710988ad5bb38c7b38e5e74d7778c7f40569440f94c946d9541d242cba8ae665705d5604e7144aec7ef8d00bc745dca014d9892514ab82dda5545493b0381ea6300c467cd708051e8270bf6702fa71bc3acd966bdd7a91ff4162d192bd7fc2c343eaa1839899006794484a6bc3c30cdda91f70518becc8ae6d5f148ee99656c6d169dfd4f706e97f226b1ee807778509c0c2d3c67986cc46387336ed34f3559f4f0f42881552f47ad3a87fc497f2496bb572fdbbfe3dd0d8702130c3fb8b06f695ea00460089e1d46bfe6d1055f4aec4e3c607afd9a99beceaccab88089007cdf2ff7746607cbb72be4cb013f55107921cc996788f08161bd7a47071f8c1d08fff4df7a901d7619366cc9b79772e605107bb3a556b1835bfbe036e753e68a743c9825af6b79ae3472e9e588e4844ffc7acc580de192487d34af0136e18e425c9cabde6ad8f6e24ba374b380713fb0958fc2964e6d15421f0beb78a869f635d24b984b54cfddb4edd93ac610414fcf1cb6b17c53e59d2e51d201d562673384c671f1b5ab03bb23b94ed2f5047eef200aa01a874aea1ca3cc661ee4f359cb89d9e1e3bf2d4f82036d58ba35ff160dcbdddfdc2258ddcade8dc36449e2c5feec7728ac6f441c4f8e9abffb224c4ef3d9ef24f11dda7424f7b29351d30d568d59e0b004b4783a6b5bbaab885cd1d602f33afdbb30fd3e8876b2fa84727736a20eb68423c9991cc06d35038babf12b4edfd4239b94c3ca74dc5a8b4c24a9298a8555a13d085d871229d9ea7aef3f33a5672c6b71c004cae65ccfb2b6fb9969b8cbb976aef0bfd71b2160dd9960054e6050fa5493d5248237714e92143d5bb504e557a6284d7c09a5ecf59d6a60401ff6757628dfe94491643b5a3fbb7d91b8efb626128c21cac52a4be6316f1291d6b50d86040a9416f5cbe90e0e841c2007f0d9930b748254bb7a7e9bf36215652300d74d76bb4a7cf4e891f78375d361c71229f01c89f45bd27dd147d2480b061ef6bcb7092fb17802e8ca7560b13400e5b45036f5c2fe5d5ae2bcf9e945306384deede5ecdd412c00a72fbf31def720111b6ce83bf1e3b2425dc013fd8270bbf66b38ba1da40f798ce9ddf4472687dbb9dbbe3922c3aff4cc6892231a721d29f87476c39201b7f5e820d0f876a5236fb84422465c62e6361c869d88b47dc83afe7a21fd76101679b0587cdeeb14a07f916b6940ef341e65420840b7bb6bcbc4deab0a05d369cda43d9d01e8e5d441b4369a7aa20e4e7f44ce3fa8be341534521608ec30f27a8a036d1d9780954295f42019019a31d2656d1dd8179c72c2149d6fc8966955a1b2ff7a0d898a876c1a8f5b68e312d5c2101a4ab9d67b22499614b1963ed0b198ddd9f900cfb359b7aa624993bd3eb8cecab53326a2194855c5a2f005bf00517d0dd87a0ebf2318ce489a2f0ea8cfd9ac0a90be1404787977ce1d2decf94cc45e4ab18d10eb8378476546aad2d261567cf81bb91b749def6962d6df93bad33a40ae2419c41b2574fd7f73b7525526d85689e25143db8c80c3770972bb7f2ff18d5024be8349980d26f50eecfd30b6114fb9234a2d9d806a9715cbce613f8cec73f7e8ea1e62dbf3d004f55f6400ab32dbb754c66766ec63c5037569adc6e613de533a2b2b0f5b753fbeae0ae1b262dfe32a611e9e7e7529f557d4548113663e06f6f7948f26a9a0a02dc9a255204c81931dcca556f326e4e7bc3a75c0df0be2bf06a17e86040626afeb5f0477cc516cd353a30444f701127c5981274729c1494cd5c0711c24b0ad6485dda3c998ca74d3d1c952f8aaa2953e336b9af64c2f8b1418ff79501b87ee4ce9953f57ed15d6c8ba2d3f6e68cddb735d843d6799eb8107e4fb048380e54f237a489b3fcab09628adf906d6ce047aa550f4429548320419828a8971031d5b77e39824ef93bb11e54f92827e97471a8dd2fb7a15b74e5a20b9361d1811d4a6f272dfa77caa62409c78c4417c317d4e1109fd69c62792bceac1af75975fdd919734cbb98be413490a046fc0c8a3b3d94d6abd283cef3872f66ceac99b7d6989ca64f94fbdd1f29a5c7c490fe546d2057c74fc74bc5af3a65f375b59a74fd90b26abe2d4f072ed5a61f3d4e11744382b6af1f157e0a8becbe6e6b0b0abc58c53a86089aa38e16b93beb9f39888a8a772b201f5a63a22ee6c37c34bc6dc73221eafbd8ed48e1911f19b2e63a95fcb4dd184619b3b6e389eaeb492b33e0f11b28585e59727faa642ba5bcd1821a6acd94b14d66a4e5a401c2da40127f7c5f9e6c2b33f8002fb5511ee0eaa30ae9df97c95298511752e3c68196ca6dcb37e021f9e8fc48dde5c871dcb524c725191a6014e19c94263525fd4a2feb092986ca1a66acd84b14fcefd0ff936dd22e35123d0911890a77738abe5a0993ec2f30a50a0eace5c47aa58e2f0783c19a708672bd8009f86336a7f4abe769245565762b13ab20a71c45075578dcf5da40db2b093a3ae1eac05809bd696bbbd9c2efff072c977da190ce31a538891f657f55f3f10ff71ab8cc50abd9f2f629aa65e82cf325957908ba44ac676b4818a0468a2ca036819caea335fa389fbd1084cace9bd55f1edbcd36602f7bf9571f25797082510242eef070cee51bbef8f901c4e3446574a4dd0e27a33e714b4f00f7d5410a2689f15062eda864f2ae025f6fe2380ba25e7c97eceb46952340330d389d63b1c3bdd92ec0401f568381815b04d4105d276f534c85254723e12f5fd40e7c77956611c5bbbc1d7569800f1197bc166a3f67e7f4884a0c5971af3cdcaf03bb1419a516b3ebdc9c66d61a74d21317226cf1a3bd2ca737f2da004d19b5aef5696d288d00f5bcc07eb9a88181478910d2995029e253ad2ea559174af1f90c02d6ce793b44c06d2873139c252d67efed11190cca89ab9e6a4cc82dca0397beed3a633c99137d5cc9cf05095ba1d03c8e55e1fe2a30e8eb5bdbf23c290e46dd4dd2dc43de5816cefbe3b56bba68b7c58b31842cda163dc9f68b135cfbd5f9e4983b4c6ecfdd9fc4fc688b466d580fcc34b442093c4873ed284f3589f611c7b545aa7735c07f76c2b09fa2291f0d2b7c396b7e55ccec16378833bfc9baae263e2d87ef7b2abb20a0b32a0aeb25a3099fe68ef8d733d33cf9b4bc4d2bba9eeffc3bc6ff4ad6303a8dd9625e3c3830d2a61ccff2f43a9efeb033b9812f47f729f6db3c3b8752b89ec93b5d2800fd9748a0b81fef3743f3accd08d57aa8788014b55c3f08ac8e33f4ddb8a619e4d6a5fb8cf93106738449f1a632a319a2cc2cb029895d978bc94a93a402a0f4bcd9b16cbc1352b18e50453424790ed65b823897aa7c6981ea396512d2acb3e4b0a595c9209f3cd1e36f75d6b75ec9155aa344871d45e025753cd231f6954736ed4ff2ffa449806740946457a87f4115f2b1b571af12bee1e33fbde521905e4a6e29b4214b8014454d95de5b44f911cf1e23772d51f6a9eecf570fda06a85618db87b3a7280210cb55efce992fc756697c3774a4017428981f6025239ee65c203fd9bdfe5fde73d2a1a852c8277820f8817d6b3e0b448080b5b214cdbff0520f05b0c8522ecaec9a63f6a60524ef8381092f5d6c571d2fb4564808af68eb7d3efbb88a18d0cbc77e6f9383bb3fe91218c820b254ff480d4aac8a3734cd42997933169e40c74cf64f3b48f6f1ca97dda041d58e606225817b3e8e4501f5a232b757dccac2a77d16baabcd8c13407805cb2fa29fa1cbf66eb50c2730e3ff2b72663a880b33752e5eedf0ffe7719b435d7401f0e7b0ecdfacbd015411c02078854b719481f1ff05f3bd0b1427a940fd839a737d6f916e1e5c5724a5abad5627af7c8a86db3db9827ad6c8e595d8d092bcb313b1819740644f7f9a338f939598529cd6d54640d8b6b731d567d4124ced1ce51751a073430a56a892211f1579c61b4a178fa8e87776c2d54da2c84c55f2b01cc9b3d7077fb5ba67c41f1746b84ffa6fa6ad39fc52e51506e8298501642438a8f899a8865397cb1155a0ce1095a1484f51f9f35970ce3a02854a89e76886c4c8c02b3f941b04887da2f4e6c02d28c0dd9ed81e2f198115b8be323b1309cb1cdb2fd8f17f1ee685c248dec16acce691eaa1d49d2c9bfdfce1395619d616a2441432663834bdd3c5e9b73a928c733b371a4eb35da3c43f903b0d468835392f4fe1cda92c2c6e6987def67126fa55f4e1334008468f31abf040c79a7b630b203c0a20ce0ef88299a8f0129b178b6d17c9a90205b026e0c0cb8f13ff8a3812d7ad454d8b46f65397979b70934cf6a3aa378b0fcb72ecf35850a33e707c630e8a96396d8fbcfade2065912d5c7ccff4ab0a8ca47c5bff0990810f5793b8470e0eb876a71b513a717a7e35660e4d23e8c0457781b6970865c7696db9a768f589b599c9ccbc37fe9df14ef0b5991748d7bb95c979897d6e5f089eeb7448f90bafb1a9ca0cfb44754c48", @generic="c7"]}, @nested={0xcb, 0x8a, 0x0, 0x1, [@typed={0x8, 0x7d, 0x0, 0x0, @fd}, @generic="718be619b01c772ad1a70081b3220132ad2c5d2350dc78efdd14c0c845bbcfca52487ed76ce6a7be986bd4a9842332ab838466725bbf11d6e0aa12859f60fd68f87e7a8e7e8676922c018326e18798effa0db3cecb8ccb9ae9b59c068c7dcde324bfabb098221edacf7d46fb", @typed={0x14, 0x89, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x7, 0x44, 0x0, 0x0, @str='+-\x00'}, @typed={0x8, 0x3, 0x0, 0x0, @fd=r5}, @typed={0x8, 0x7a, 0x0, 0x0, @fd=r6}, @generic="1bb704", @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@loopback}, @typed={0x8, 0x8f, 0x0, 0x0, @pid=r7}, @typed={0x8, 0x6e, 0x0, 0x0, @fd=r0}]}, @typed={0x19, 0x66, 0x0, 0x0, @str='/proc/self/net/pfkey\x00'}]}, 0x1128}, {&(0x7f0000007440)={0x13a8, 0x1f, 0x8, 0x70bd26, 0x25dfdbfe, "", [@nested={0xcb, 0x78, 0x0, 0x1, [@generic="62e2133dcc8142e2c3d7f929e823afcaccd10791e854daee5858cecd24aab7365aba9f7c497d79eb12426f9e5ee586f408f83406febb961bb95f5626e04a4042efb73be7edb820a8025c6455fa891514fdb92e2d442d1098dd2c40822e8fa29206075e85ff19e8960d3a29d59c8670ef9d2a8962a17c4a0bc5802ee42ae3e7df163cd0c60ccea872352fded60cecdeec455b4e5878ee7e65ee3e5d471722eac5eef3745d730894d55d41c28572a6c335cdb8bd9f3f5efa765506c480226f2fd078c49ebde0b4f4"]}, @generic="e70df1c17c2aa15324d4b1f3206d839528c498291a95e52ff65ff6221e16c635903620daf0146f62f2a68d19d1b69140538471782b04ea0d83e9c6b8842f7853b2aac4e86a4fb409eec424d03ef7fb7e53757d491b25745c13eb14b9cb3fc38633752c7818abfcb2dd2b5bc42866602221635d76376bc97f4cdab13d15a5ec9137b43378e58a70d1383043d4f4143f6fc46930ab7a07e6532924bb86e29065f282a308a31ee5c470a81990afb83418488fed8cd53c6fbb3a711cfee0a3e3cd058bb61bc1c2a9112735", @typed={0x8, 0x4d, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="ec40571fc802e187b8bd7cdec7f9fea7c9de709f3877c05e4c507618a0c7b96610ab1ea7cff9889577bf0a71d71e013c8838266ae51dbc1b44541c582d08ff666f15e023cb32e1ad38a5bbde08e23a340fa250cc13aae5289b2ab282e0a17f764825", @typed={0x14, 0x63, 0x0, 0x0, @ipv6=@ipv4={[], [], @broadcast}}, @generic="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", @nested={0x181, 0x8a, 0x0, 0x1, [@typed={0x6, 0x26, 0x0, 0x0, @str=':\x00'}, @typed={0x19, 0x73, 0x0, 0x0, @str='/proc/self/net/pfkey\x00'}, @generic="d235ed1f6f6344664f635ac7f58444709b702c2ffa2b0c5ba225c3abfda9969ba785ca767dc4220c42847a42cd311f1d50851cb99e8a53900ee4e71c39f70840913c9b9b196755cd170e18bb69e9d18bf366ded07d874f06d79dbe92b32b427ce824a5e5744b24535dcded9da8f54c3930973ecee1affd6f221bc8d5c18cae410ee826e23b063f7c18fbbc86d68493cb34f988f54614019405084ff8bd6e57659e461ef8ab364b9ce7834f05db6e3e740dca5f7ac0ebc7c0f4984a0d205e4651ab9cd3454d56095770ea4a13c846c29158ef02f3d3955819", @generic="ccf1f57196bea2c852100f37c61d825e9b2b1739d9f31787047c44fa585cbb7db8bd4d6e6a", @typed={0x6, 0x71, 0x0, 0x0, @str='%\x00'}, @typed={0x8, 0x5e, 0x0, 0x0, @uid=r9}, @generic="7ddac75172393c5729274dfbf78306adddee7cd276d9e9940760eca2e3b019f69e6d52cbe498086406abf348b3aea45457751799b171d962dcc01257cf5070e2", @typed={0xc, 0x81, 0x0, 0x0, @u64=0x10001}]}]}, 0x13a8}, {&(0x7f0000008800)={0x134c, 0x40, 0x200, 0x70bd26, 0x25dfdbfe, "", [@nested={0x12c, 0x43, 0x0, 0x1, [@generic="ebc4bfde5545ff99bd90f0a8a29b90df34ebd93af070f26efe82f089e200d07321c1b0ddbaac5be84f5b386ea7ae12c634b7119bfac1c8eaf91fffad31d72eedf86fbcb27dff36a62dad0a0202f58ef2bff555246627c27ddc6d88ecc8776b1e80593375143878d9638488f155cd78dc1aaa25dd1c522c19b8080b4583226e91d2f230", @generic="6a3db96d3986a1c59584a29ded19e700f0a78661f977b9a8567c2f7de705cc0de177f0d73f059689ca3ea986d8a56095095148f4720b87294258b896c5f7ef6c6a8d80a135f882a0969aaa11702316a4e14e21b6d800b5f37c1570e437479bfceebf5d8a67946d767fd9e28b4a907dea227262c88b1d330cb695a44ed4e1c096c06d2aaad52f728bb414f11445", @typed={0x4, 0x49}, @typed={0x14, 0x47, 0x0, 0x0, @ipv6=@remote}]}, @generic="06a9e74d45af998acefe57c10bd581819a8d593acf3650cdff0902e1dba1a461b768942b68b29f71b0422449f16b7fef89684b920d7c3b48785848dafe1cdca548ee3280ab88f23f7a55890c377ecc18a06e7d245c607ba3f03720489a9c5eff3c6ee5ac7ff6a2293df066c7b7d89c956a88e3bab7fab4f5bee1f6b51aa878f61d0e5746c4d08d16886a3bcce40abec7a8595eeb067d2b4719e23d2bfd9fa06fa13eeb12c7ca310bf575c961db27ec387589dd1ea64ade25fcac7782c24ed3b31911d5d85365eb5437512798d081f89d5c62822bd669737e65e7ba", @nested={0x4, 0x4f}, @generic="41dc25f750250a13928a9662a0a561c588ffe9d89a099d799737f5d5d6a3ea7b92714769512fecb007ddbb14c54f5f605cf36022bf5082ae48806925db9cff19128deea59b80f9a6b60252bb595b420c41215935caa66f5f7bd64a15fe061e4848cc699baffa9651a4d682dbe4f799ed8d1cbec4491ac7da685877435b0ead7b1f2419b8564edc", @typed={0x8, 0x8f, 0x0, 0x0, @fd}, @generic="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", @typed={0x14, 0x2f, 0x0, 0x0, @ipv6=@remote}, @generic="81990b4e204430418c74f8647dae9f04ba1deae6ef5f61fad34d92518eb13560d48e496f4b59a6a58f9fb914d7c4c54702e55c71a177c52920fec1d1ab3c9befee67a9d5735e48970d2e3c4d35659a3273724b8ad09b186d19fd45c1ada7cd38670c9d1d56902077da7de31a1e2ff660f0a620dafaf6545f56e6804d77405bb8b8a5f45f21229546802552"]}, 0x134c}, {&(0x7f0000009b80)={0x232c, 0x1f, 0x8, 0x70bd25, 0x25dfdbfd, "", [@generic="4a1020d0c52c3cfa8e14237dd77d665145fc8d7c3e68028dcd603c9962c81261f171d0e39d5f94c84d3f7864d160b103145d639c53ee9c5982aca32c9c5066400b7c03df8ae59016453a7c22e61b24f3e88bd8b76de44a7bcb87c381963169d39264257bb58b16bad0f7e4028e88", @generic="716b508f1aadb21865bbadbbe3ff9243ea8d9bd6e60e99a33392d84b802114dad0cfd9f3abea8db766bda6699ef229b05d8e6cd5435f0eec4db4c72eff2cad3b0e68dcf57cd09f9eb237ea722bbacea1a5a57e21b8a9f5456dc247b404ebabe79ae6076b5faab91b9716383d07c5ae95b4fe341f2af4a3f6e8fb8dc356f7d01daccf939fc45862d410e5d2484f42ba5de8569bec6ba038db6849471352fc316a048afdecce4bfeea8ba1365f10ff48c685dec5706fd7f644af762a26b6b97a98996c90d0889ba3b836f895864b2c8927079019a760dd8336e8deb445bae6eb777cd8b797ed5e5d03bcb6974a6384c0feaa391df1d816a076bb64abea2a842b65e4027db35242872d5f364f23ecad6521bd57eceee3dc72da793b77f8ccff572ea57732833d9080dfbb373bcce71e5f052301fb61887e40b01ff1132bba24b9fbaa296fff60c5f91a3a6ef9f76f8ba0a69f8b167cfa37ee8a85a2974c6cff0760f33356b3828d373eb5b91cee59938a64fc71abccb26190158d388dfe6627c36f665f3bd00e185c4dcb5c5ad55b63250d6ae2342ed238cbae5fe181eab66940001e95fd6824d2add5f8bfd9678a2d79148423baf34dbff11fc586988bbf67e5c814fc1e2129277ceaa3d098c06d37decc638c0e8170d1821f032149face6b463125093db1e658bd49e00f2f6a952831fc984c9de3d3e8ed71263a8d14b1b5cabd8c267786f366e300b354c674fc8c759c36c89fdc471a90c7a6c307afd5efc2c2845aaadb8a3c5e1f7da5d7c85e0c0bd4318401171353d6bb5bdd1e57f0da06ebddda6edfab044ac874a08745948eb71e2025dffb151b95f0fe3dfd82df4f811111f01a3129ac505446335d7b4bfe42f2ed8e093dc11c316bd18e049d0f6d6e5b33d56457b64018f6d234a22cf090d820fed2357e301d04a902928a5a02099e337647d8b1ff71d77ee54953ada4850ae5a69cb7b6111a171a983f73de53351414fa8c8e199d06db8835fdc3a0506dfc9ac6481b4916cd1e65e63194efb73e548b9cf62bd3d9d2a69205d569993d89c82e88c0f6a8521e33259228228266c693358695396c2fd2d378135d999e14f97c4f9b5297e75deaab9376dd7b7d2d77250e09c6992878ead2c6c03b4a53dc5e17c9539e010ab80e7346fe31eb91ae4a8487ade81bef7670579272f22882dbb1d9b124fbcc47f54b7a062c208bb2c9c0f39b219ed8313d9d49f4274d60e92f44703e69fddefd0d9c86c98fbd2b297aa32ce869201146ce42fbeca30c5aebbb6f73915c2e37edd5f7f038e7e65f5c50aa8b824a6dd2954429373f17fc8afae5a2af3ebe8dc3d2e9eefb5d207c95c0acace5fd19fd503a444959ccd3b42ecd71de991085a658417b2e1b68c1c2fc2ac713dc63fa02192a61731be9c14107f053dd4bbe6dd125fd0ba581057486c020027d8ae6c485291b7afff42ce56c90adafe0db18594188862c21f198feace95905f9c1904cba74c00ed9d54e640f9de9b40c44889a174709f9fa0ad6e7093619be228f3cd3914fe863755754562d9c80bae0461cd44bcbefd864e17ecc0007d937a66e66d79c82c0add94c2d5bf394883f3e5d2a64c17b1f4ccd64efb82ffd35d9f107f59913d869396bbb036e67868a3686775e6c6b37249aa4fe56cac1634bc5c25a516ccb0ee2f120bf65d96f2bf4ea07c9aca72968e8b0d919357c147e694966b4c02fd9beed7e394241907ef7e1bfef9ed38c223a125675b42a5bd7513d3be03acde6eafd0e819424ee9c63eeedbaa034da362f804947661c1e7c4b9b09f9f110c1064683246fe323664fc73364a50d6330837c3c3b3592198c6b584ae4e2c3f5d6a4e85a268c07a92696c24c39c6029488d867038b8e2c3ebc80f9fe55270997e07ec6eb21dc9f8d0fac51a374a3875117fdc939a106979bea7c79af03474d15cdb20db8fbc1abddf5dc669e1bd3b3f50ab86f83dfaa586dc20bd671c2ff644d66f0fde9f30a1f93242a0382d994f1bb5a949a1e9177adb2b9355af834d4ba0d2546885aae95f2367149f2433ffc9f737e4d3912042e6c26ec866522f4b4dea2ea4a7f5ba685f9ce4082ddfeaeaebaa51dbe0ed6cb890503d2ffbca87284ecd708f39d69085551625737b5c30dacaf7196fc1dd8d30672cc0cd4fbc03e9746227e4808c4c4727ea5341a064581aca830cf4ec9186c126a4144e3e587df108b0b7c2ed3b680848e5fec409926bbc37bd47a7cfc29d654a86f6be893ed144da2658e8af29264fea91600fd88e9513272c805b1a4c4f7c75da501956c72a5f22d6e169d26e4b4a1fbc380560d265ee322656f0e3a93e41cb244dca1c5bfa415944341c42d2f92b97fa7d2d2a9c026cf44ece77e3807e3ee14f67b2e611d41fb242d8eece4828206cf0109e7d1dab2151ad6e270127732127770027150cc7be56b054a1bcff9c0de7a9982e01bed6132110806abc69fa873e9e987708013d89fb5af3f3197771037450872398547def8fc4a43732bc204ac54a82c199b0089cf0700de620a00c9f3c5d8a67bffefaa4661f2c9a8b0f0759e8cb4224999708fe860695fa80db697a655acd2c3dbc646ceaf5f979f68e60cf639b9bac492d7619cfd49ba657a0bab6a79960ccfd780a8b4827d9bbd0b3bdacb1bc7924b9991e3434334ce4b34c833daeac4f4c9c9d118b3555df192da611a47ba872fd9a0f10821d8f8095769611febc6d9db9eeeff85a6a91d1ca9c8b8bebef73b28cbd1fee72f66246bae695ae3837b23a3ccd1d5c0c94d3b2a5826868919a1b97e8296d422002be888ef290d38deef6c4d68106c9f2edb75beba9eaea3194b3da45951ddedc67f77f90495b9aac8070e148bf259a7c95b1044d95028efbdeaff3ecc31ba1b99062190cbceda57f6e3c5f11f5ddafc2842854d17740f2e361ab25e0b9df4a389e94c3d490356756f6dcd37ff47471e498e7e286d7fd9409ca927ab8e6b4d4a32a6b7533409713b5e5891f06f889f84110e9445d73e4d111e36856b088f1518eed601c5a382d0ae59704fe299911a3d8b7413839763a1db9d1c2fa8d950a8e2a3bfd28cc5495ae6a9a7a7c8c8ff5cb484f6537506813fb5c85b31c16e8c034d270c37a80f3c2db767d5f739b0b5223159f76bd50f72602141287db9103e77c8ed3763d9513dda2784dd220f8ba8f5b844659af6c3830d29eb23cb0e1227b58134721d3aebea306723c01d104e1978ac31b367f6320b78a7bebe823c75a83455cbf7e9fc285cd22fbebef3e70fa7e4cf366fe892a24201ecce67e53742ebd8c0682d8da01c1135eda9cf9d9279f9ff27b592f0f703e8acca5f58f53db7121fe7d4f9cdafbfe58f1086a51b6031d54a46467de92b7ef70d1e8f0684aa8b70116e8b11ecf64fd70841d7f6dd016bf83a5c79e1a0a97694f86f3b0d92987b0920039ef5d3bc904efb473049eef2839f977792035672f5ab56511f62616c5ba061f8b2cdb0b9ef112ca92f5e670199ee34b7cfa4a7f4b44a16f8d22f6743d2419866748ec5b60ad8a53b0c061d4682e1562b1d4b28f6b3b25722e20c0cfbaf7db117913d6ff15f24a3f8efc4fe6afd12ac5c2a528fc602a4a8ef5f5fe9e9e14c00a713561e155f8deffc23e2614e0e4b68fda207224122afe6ecd1773d757ee4c9e4fa1ef8d8bbaf7bdfdc3bb44e47ae8a079bdeeb473fcbb54e39e774f6e457e7c5a62c8cf48dbd9374d16d6c803010b9e942e53da700e8d44cfa86e3e892ecf1e34d680db4f9594e040155f8a308666d39b1105f046b5f063e5c8955e89e5f9cc345c51fe9adcc0a67dd084492e0c32869911c1d413b698f97f157f57c5ed1eaca1d49568b7b66e7b4a9b053d1f4fa247206461387f73c234adfb4ca7090af06238ed06a4b7785f96f68221201d5ed7f24da88115d1aabb343573baef6972bc4faeaf0d7ed3f0e9800c98ad4d5fa0b32360de5b375729eda6b5421866cf6005fd46862fa9e032f5c10c45799999e037d5a9f7e2c2e88c0ae3124a09b718d8513553406e0737ffdd66ac9f386c81e739c0d4a9515bc5bc8d96602a849c775fd2fbf7ab818d7316f32d80f57f7c20f5c0419780e22beff0664513354aae228646585e02ce26604d317920bed6df28f77bb285336fab0f7fa451c6be78c3a8fe026d5673fb17b15a04caf0df91ccfe29e86515535bd23d2599769c0d246fba400aafc625fccdd26ca7a163d0cb82752a81831470774d582898577ba2e5bde420569af84f33c635fff7efa41bcb53568ca0b80052e7ae0df6ff5347dfbba8e0af6f11e19ae44a2ac15f2e38c452d32962ea356fd4062cc999560b8632bf62f755c04e404bd9ea2879f4809cabc221f5b2bb72f790f57afe91a272e3f2c9a6cdb366af2e8653536062dfcba3741e71e53e3b131a05cfd9425d620b877d6ee3645cf8a2d4bb98675e1fec1c92b011346da22595a11097f1a7cd95e9238f840d80f1004176f9724824bef02883495a3b82d9062088c026e0415eac0e9094863ebd6585bb6474c0eb55f73d922572035d3e91ae8c1b35386f147caef869782f00126c9632d7de1294ae065ce69d72d52760c5ee9ede2a006cdc5fb17759c20f54b13448c659954bc6d2ed08d87ccb2d26345af3f1bc0e3f7a8c2653dda8496a55495048e5045251827ace9d7d23dc18d9a513360833b37f07f0c3cade43b82c28b0380f8c1a053ccde33804a0968b6fceb2a99ce0a2a174596dfaae928be942cb3ce614f4600e35bce34e28a9050522d705a5b5b457afac350e2ba7054f5e6387e4917dd9b21784a3ca3bed7e9424babe94277069812fe2ff914bb6a15eab26d0a463af6c1bc0ca8824ad8ea23e9d191dfdc8d6aa4969cc6ac43fa202629d006303e41e5960f6d75ed02eb558adc9011815f7366a64b5c086a7e39d9dccba1e7abd018d96279cc2ab86079a3fedd8e45005d2ae3dc3ca0a0295045b701bd810f7adb72e3c919c4060aa0dd8d22630a1384c2cf6ce09b9304b36874edf86f58ed62446b84a75a725f0d480e154bd4a16588f31c55e4850348eb81445398a483bd329afc30c3e2081417498652ebf1f3a914341cb140c814284f67b8f70438c4953ef1944852fd677aa4955da52ae474c9947dd9e254757ac33a3d2a16078c0be038664b7974f3be9d7066d59dfd992318ceadec6edadc8444e3d203763b14397b2045465c0a55b1a1b7985cc534d10dd2c835fe6970d113bb919c7106294f833e6d16477f5309ccd2ccda3fb4586810ee5a14ef7286f30c019bc322a4cc60cbc65651e9a1b160d2d1e969400205dddee8c2cd2a73eb6bf9e6a692bf0bdcf61e675410624253736023ec1853ceec96603a3d0a3e7a70cb87c91bf560c6976bc6f6eadc1e86b32caa49642641964518a42cd67c2d2c38fae163a6d83794adcec4a28c52564ad3c6ae4e29504fad2bc5f6fac99084e91263e9d5da1260fbef0be63fbd59c0814a9584825620f440c4b70b28daee30af0936f50f3d0ad3382ac18ac85f990c2a28798ea2702415fc54c919a6326bc6ceb5ace43da9ac14b9d8805cae1c4ea6ad0e2ea86378641d0ddff21124a6ba145186219b488062828483c8fec0a12a84456a532ce1f0742602577c7cf498c8718cf94ecd1cb5874a93aa3ea08f3872f28b94fe3e49a55a9b0ce7180bb508ce5782b4af90cbe5a5d356edb74be82ffcc4eb2ff7147b317f7ce3f5ae88fd43e17b07d8ef390d66e6397af7bc9d91787fefd589dd4174cc074aeaa3287c48555e42c5d1103514c89d001e62e70050fdef568fa6042599c4", @typed={0x8, 0x4a, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x39, 0x0, 0x0, @pid=r10}, @generic="67bfcd5a8ba647233245f493ddc43d5b7e6f4a3266a5895bbf42debfc261ecf93e2079080ae24005bb7065a1cfba4be28af8ed2705db9f7e433aa1f90d0cd6f9657e7af42c75472e50fb0ce0e55d333acd98955ab49f762ae6629407a0cd8bd84fe694683e28201eb301c91ce818d0688b5df6b5e4bf49ee547c81cf128a425b104811278e6b57437efe05dcf258a832f007a434db817b9dbf37c9d154655c8467da", @generic="2f9ed70bfa6122b668a1655e21ea74857bc21ec2bd28e1ea4fbc97863a5e00077e3b303c039c256866b095279ea8111127a359933f7326d38875a1299e524e4d814573c677e968a6c219c1971e854087c550d0e75b35e399ab7a134b925e5a43", @generic="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", @generic="5ca0aaa04ee9c29ee32a9f9bc151c7677d74ad1d8506f734f4611c9ae77ff197018505b08e8e73075a927f6a019226958af23e32046cc8a64313dcdaafe072f7dea1caab6e2e9df64c8c718c5a12a22730a6c7934f7a78d5d4aafb9bb61f1123b7ea0731da048b9da07015136728baf097b3a60f9ef07854ed4b4ac06dcec208dedc6eae461da9d45598ebb87065787995e958a638a4c2767a77b86c98854e5706ac9f5b934607305646b3f9a8261ecccc10fc2ff6bd60ac4fb686d5fe87aa00df2bfca6e555eacd5d8a", @generic="25f6d52f67a2ee29d5295fe36340810138c9bc3146b584d1875ae9cd4dab127ab6a2578ce7e83ae8ab7340edd68ee84a8ac1b4169cea1b782957b03845dcf8cc78135ff63515b0d9e5a16dd854f1c29976a67bf800181412a7fed095706f79556264a9f3e6c8458f70db0ac2e4786dd9c412e38c61aef0b9070ea3d7d89103857aa1922f306d2a58185068c14ad4cc66febcdb4a2461ec665b9a9083edccb8c8fc82095f4364b14ec234a84f9c9f32676c00724050e6859926cfa441717cbc493147228e22ba5794bc79b9c3d5c2381d6c2d"]}, 0x232c}], 0x7, &(0x7f000000c340)=[@rights={{0x2c, 0x1, 0x1, [r11, 0xffffffffffffffff, r0, r12, r0, r0, r13]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, r22}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r26}}}], 0xc0, 0x40c1}, 0x8000) 04:19:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x31}, 0x0) 04:19:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2a}, 0x0) 04:19:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 377.594679][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 377.702321][T14997] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 04:19:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x32}, 0x0) [ 377.794151][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2b}, 0x0) 04:19:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000004053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 377.992549][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 378.061143][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000403582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x33}, 0x0) [ 378.142170][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2c}, 0x0) [ 378.548866][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 378.615536][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 378.664335][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 378.695768][T14992] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) select(0x40, &(0x7f0000000040)={0x5, 0x2, 0x9, 0x4, 0x20, 0x4, 0xfffffffffffffb31, 0x3}, &(0x7f0000000080)={0x2, 0x3, 0x7, 0x3000000000000000, 0xd6d, 0x800, 0x6, 0x10001}, &(0x7f00000000c0)={0x100000000, 0x5, 0x1, 0x2, 0x7f, 0x6, 0x200, 0x6}, &(0x7f0000000100)={0x0, 0x7530}) 04:19:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000001b13582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x34}, 0x0) 04:19:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2d}, 0x0) 04:19:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x35}, 0x0) 04:19:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2e}, 0x0) 04:19:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x3, 0x4) 04:19:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000200053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x36}, 0x0) 04:19:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c00000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 379.469076][T15073] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2f}, 0x0) 04:19:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000300053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x37}, 0x0) 04:19:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x30}, 0x0) 04:19:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000400053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x38}, 0x0) 04:19:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000f3053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x31}, 0x0) 04:19:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000a00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x39}, 0x0) 04:19:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000000c3582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f84700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000080)=@generic={0x2, 0x20, 0x40}) r4 = semget$private(0x0, 0x207, 0x0) semop(r4, 0x0, 0x0) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$GETPID(r4, 0x0, 0xb, &(0x7f0000000100)=""/40) semctl$SETALL(r4, 0x0, 0x11, &(0x7f00000000c0)=[0xffe0, 0x3ff, 0xff, 0x3, 0xa7d, 0x3]) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0xc436d0daff41d71) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:19:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x32}, 0x0) 04:19:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000e00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3a}, 0x0) 04:19:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000f00053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3b}, 0x0) 04:19:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x33}, 0x0) 04:19:18 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) 04:19:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007006000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3c}, 0x0) 04:19:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x34}, 0x0) 04:19:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="704860f40e49f5ac1ec3ac353af339b2865061e8e926d194838d6848f4b7ac32fca4002b6dffd5da86445e67f172990fecb1d2796ca1b3be342e9761059a1b7a5e63f661ae90ca28e06323e4bc01c98990ace1fdb630cbc5a76fb34ef55aa692b098ecf482f7d1f0a8a5f85cbe7af925dcfe5691bed14cdbe8fd62769993f3b97fa38a33c0c9dd7949e9ac21f2180f175dc9f0131e36e01cdf5019bc01efe302ceed63a1bdfe8dbf367668aded", 0xad, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x2) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) 04:19:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3d}, 0x0) 04:19:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700f000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x35}, 0x0) 04:19:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x141083, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) set_tid_address(&(0x7f0000000080)) 04:19:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3e}, 0x0) 04:19:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000403582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x36}, 0x0) 04:19:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007002e01053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond_slave_0\x00'}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0}, {}]}) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000a40)=0x4, 0x4) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000100)={r2, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000001c80)='./file0\x00', 0x10100, 0x8) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x6a20c0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) ioctl$ASHMEM_PURGE_ALL_CACHES(r6, 0x770a, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000005840)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) sendmmsg$nfc_llcp(r5, &(0x7f0000005580)=[{&(0x7f0000000140)={0x27, 0x1, 0x1, 0x7a842aa358fac3cb, 0x9, 0x1, "0c7ced5334bebc3cdf2becadc26b79704dab93adf645e80e759be5d017f81848a160c6a971386d70358f3a8753732a5ca8e94811f3e18061e78aad4aacf73d", 0xa}, 0x60, &(0x7f0000000480)=[{&(0x7f00000001c0)="c8072240aed7670474ad66fac7380840592c2892bc08dcd2662d23e4b0c87ee479782f8f399e7a51842ff47cc368c1979345e9666e87d9557701497eb47e0eccf8dc8f968e839ca2d7c0e7d289acb04ea16b5141c5e11d5facadc6ac29b1287bd37e0ce5f682b3c6e018aaddbe6167436da183dacf3ae0ba8bce8d0021bd878d445bb7885270d6781a8803b64c63698dbf6509d2db4a71cc2a", 0x99}, {&(0x7f0000000280)="cc683575a0cc9a05ccc544369ebe360896e58d73c61cdc8142373d0f3deea5d0109255998b9dc3bed0d269baa7c16faaebfc04fb745857214e5659a35f40e5386788f2097131625853d3d05500bf818f0a91ed0fbc99cf0ea83a46c27a72e85facf7b9377a506dc5de70579e8b83b843933eb4e9149a8eda5171b167422c402cc64d6602120b290416aa06831b84318b90f2529d1e2ca5930cbaf7d6dee8935f4978fc985af23210de8c948d634e722f988693d297102394302303a279c8b3dfd202342e0cba9d875b3419e1aa3968faf52851f926", 0xd5}, {&(0x7f0000000380)="ea1a8218e34295c2306b1069ccaff4cf1f8d8f2193b913222b6224851c440ca170d6742c03dbbff63785de50e2382e2a5d25548e5e94b11e88096cac21a8ec41c323f2ef0205a5c7ae31c6e0a79128b09f82dbbf28f691d321af3ff831827938f9209ba7faefdc55071ee23052c41aa020412e0d24192c43b42bfa9c31cc2b70d0ce49661c169c67997ee46e993400e9b17bf019ae8fb240f6a22dfec455407a41cbc38c5d47bf976e80ec77548e0bdb85e41ea7ad2b3bb5c7ab1d7dfb2b54cb64dd5477bb89f5661acb7aa51048884e7d54cbeab85e4a7beaf7c2a89098b460a6ceb5", 0xe3}], 0x3, &(0x7f00000004c0)={0x80, 0x113, 0x80000, "98287750dfc37b18da438e5b344c598f38067f0fce1e18c2730cca7256b24382656c0747d8bf592af202a3afb5156256f9e20723dc38c8a0392e1c61acdb9a250c784ceceaae48a3e7d480bb3479f40b7a85003c2540dacfb1853f2b2e8de3c376e9d207ace3632816743481"}, 0x80, 0x2009881}, {&(0x7f0000000540)={0x27, 0x0, 0x1, 0x1, 0x0, 0x5, "8b76b64220ef8b866b4dccf2ab94727b61d0acb05931de877de89264a23dbab58faf5d83a79e35328f363d18fef808db00", 0x24}, 0x60, &(0x7f00000009c0)=[{&(0x7f00000005c0)="bef672a42e3df9fe5d92d0fe6c4050b6ebd381435334f66894a3431d006ba4900b89c87edd55998438620495bb22034059ae0b15102af618e9befd793c4befda3808d2278b5d96e1c5f4efea874555960cd14e330bc62d84410bbe29aff1159fca804ad715e03a59bbd529245b303aa41f360320abab62341178fe468fcd159d6e13ce397f40e476fa8b857aa1d020a1d82116b52d59c9618b7ba21dfb9c91ee", 0xa0}, {&(0x7f0000000680)="97c18ed9c586f41b3e206ced624677021796c243550c951b280407edc91acd6413079a3cb42656c4fcafb4259826817313446d3b16bf0c31e853815a2a22f9c976a3ce26ea4cd09b5fecab9715d518ce3856e75bdace5476e79b4f6ad3a4b27edc77746b3fc908ac7addc5d610e1b498a0a3f3923a799f5e948ac988104e5a536dbba8c201431a8761c5ad97e046d335e6fcd880ed4f9d40580d77abf9a6747a85bb21737f666713c963f4aa395522", 0xaf}, {&(0x7f0000000740)="1bf54b416bc2a4b784ee95d99b3b6d8fe5807f56ada3e7a0ffd1d81be25b8e65701486b34b0d2fa46bfe58bce2a90feb1d02157893dd6b4dd6a5d5f79906d1dc2ef6fad951856781c4ac5969795b44d28f06a4fcb0871b6ae7863f3798c383187cc253ba926fa13f5c922d3d15288757c1f0d139d00c05fb0cb3d02c43e3d84889c6a8ac11d501633d6b1b4cb82ab097995746e268dbc99d827f0054db6a74183a2abde03762a8b99dd3850e81016ed4bfb22dd304697acfc0a28906f1d9708803ea2282eaf838a8e41836d4b400d459", 0xd0}, {&(0x7f0000000840)="4ac64be4ffd7967abbe2cdcfcf8b54735b75f90fdfae3ffb83838dea75ab360495eed273ad44b4c4f89e7c55bcfa01cab0ef2b2a10c1956930c8c62ed2c91a53dd12692fe4073bd9695bdf8fa2864d15239acba3524590dd61e36139e3fef54de9b7e0c952a8ab5807c8f7b939e235ebd3750c19b73db1ddddc9c0912f7310bceec83b0cacd65ab92ab8ad660b001347b0bbd9370d7f8751c0826fd96453d57e28e3b7cbd1", 0xa5}, {&(0x7f0000000900)="634036d333baf6014937179bd211a922e4fb7c63192cffc034328c76d183de443d626d570960fbe2c18486d7662e7174dc03732b02f200b0b2fc768215a6ff1afd119998301714bfc3ee2c6e82bd8abd566a04e00bc5b7117847e7a7edcd7d3fb847c7454295553ab27baf9e655a02b8738459719df576a144f6d5e5bb77c3151351bce4d2d08605580bd66ec217175876767bf4ca2839cbd35c6908efe6d2761dc9696921650393f33ca6f4f86d188934", 0xb1}], 0x5, &(0x7f00000057c0)=ANY=[@ANYBLOB="38000000000000000301000000040000d6b0f0d60000000000002a10ee40fda152cc824db2dbad619b53e64a700e617706ffdd5e9000000039c2620826cdb78bdbbf79ea230fb7b0037a6f7acbc0202bf112cc0371af04718f454bc971717c17d96773d4bd04ce6c443cf8df40ddd2ef3dd41771e72a69c9"], 0x78, 0x40000}, {&(0x7f0000000a80)={0x27, 0x1, 0x0, 0x7, 0x1f, 0x71, "da88c936135b36cfd2bd930d4f21f135cf6e9527a3657178e6a0bbeacd59920f27d811b9990e3b7edd48bd98a740e61005f793499ff0bfec6ea80da0878ba7", 0x21}, 0x60, &(0x7f0000000c40)=[{&(0x7f0000000b00)="2f2699f05920e84d90cff3287a358db7013a434d69d16d64234e484ae458e9caf7e2f75fde99db37a38e454d21e55a5694ddf972acc8b257d8a79f8e83", 0x3d}, {&(0x7f0000000b40)="9615bf90a384fe5909c286a62f65a01e4a4fe703f7b54abbb6cc9512ed071da62b1e9dc2a89c0b4e5a3f20a6cc8fe7d36c028c98258bd8e20729badc3e90e4a95a3e813e0949688133be9dbd32f5c29af149d70aaddd77118b7e114f32a3caa7cfc60b3159c8799d6492e051facc74d58f34f5c7c39aa1a305c0f8f5c0c8bbb8869455f4d440c6c440aa006504e227da858bc789032621a3e4a2415aa32355c4697b7cfccda2cb16a04dc646e5963708006bffb340fa57b5b26d81ac6f473e2e2a7d7aecdf7d446e9ef9ec6e2fde59387d65", 0xd2}], 0x2, &(0x7f0000000c80)={0x88, 0x115, 0x400, "b27e9d5c7a6891a296afc519cec39c272c653a01c0d97b9dbb2a65ab7c925a375a0708fc64ac7865534e29b43482a9fae32fadf0a8b844c24836310863b923f7884e30f2c8afc6c3029d7382e06b47d6eef363e058fed7bdca0add8600ce485b58c6742a8d9c2c1dd9dc0e755301a6f8fa"}, 0x88, 0x8000}, {&(0x7f0000000d40)={0x27, 0x0, 0x0, 0x3, 0xfd, 0x3, "2d975c5c6cd90b86d9be1356a99358ce2d2c4b2cd14e015149dfe69e6c4f4ff26858c185b1ee51984063a634f45cd23ea23665c2748a23134fbc1a2a55a1c8", 0x13}, 0x60, &(0x7f0000001040)=[{&(0x7f0000000dc0)="8c6e26a94c3fc1654d0955e8b88bc7ea714b3a52c565b9060ea5b255223e029ced45cd87eb027abeb759280edd3e20c4135c80d82f6ba141a35c30bd0097ab0b5abfd4a52011c5d10fe65b1b2598ea3a68d7e293b0c2aa66bb86f104085c09bfd9207c2007119106d5923c5eab3ef0702531cc9c99c33613e9114be858daca353eb8e553417934357a4b0f57fe6c5a25dc39513820f33ff305c4786a920450d33c0ebaa7c6d80ee8578313af5cc575689888f87135577ca25f170307740854aa46060efbd8caa2aab6ab", 0xca}, {&(0x7f0000000ec0)="69a5e6c3ac1ff0f4b8052e33fa08dd8fd9c48ff9aad08efbb1c142b8708b0fcb362540263e34dceb7fae764df39b7345f386c2f91cadfa65f19a295985a85e3b25562759c064ee6ce6e1646a0e014ba88046", 0x52}, {&(0x7f0000000f40)="a12e27052c7e", 0x6}, {&(0x7f0000000f80)="18590566dd21790c568b11241da25a9b82b10094e42e8ed87ca5d137b7e1f12277a296cfb30cc6bf87e61b697a847c67088b6cd71965e552ce722e061905b5736034e7b6413d3f1a49cb5733c38b7efd0298cf966223a3ce28160255d8aa99d664b61b77f161a3f2e7131bf5d1f1a4b1bbd391c79280e4414e9dcc6ba54654ed2d9f14ae4ab76cbbaa507f1dd0318db41c1215e86df1e6b9eb39e41d40a5fd8a85e8df4f2a98", 0xa6}], 0x4, &(0x7f0000001080)={0xc8, 0x3a, 0x9, "20b1013f8a204a7d90e522070f097d30917fbc8910cd249d8aff82d0c29cebe415845e51937cd60fd228f9e5427a9baa490d6f33324bdb91c14e0702650c821c4e7bffbab28f911bb712b3b26c5f4a2a8f1fb3cebff90987e88bde6c9951e77bff395b3af4b7ae8df0d399a7c66dea3ecc2ae986f69a029e32c62b7fee317a58f4615b22326f0bc6a780b783da64209352564864a03817342c3415bfb80a969e3783a3860ac6054c4515eb1db38cdb41b894"}, 0xc8, 0x4000}, {&(0x7f0000001180)={0x27, 0x0, 0x0, 0x5, 0xba, 0x40, "262b3758f68aa8d4876a338dc3bbe185f3626dec600d9ebd8253ae30f80751f0e5e3ac841887ec0d468e3a91c2573dbd00", 0x1e}, 0x60, &(0x7f0000001200)=[{&(0x7f0000001280)="94fcab735606e472f9b05a7d1ce74904b12d8c748710e84aefa4fef45376412e24a5346c04b3fc175eebc2353fabdaa2834a20e545adba49ee24ef1e185e9f4df4ba482b444ef8a81d1da14060996ed0a32e3b67218c423ab2ddc58e240533f1fff4395b20b1274c6c9fae1cba1c8721dcf2a70bebc584250ca1dad2c64f06ce601d60ab7cce65d0649b0514a41c936152177062b745b8363ddbd59dc239962021d0cb6f25ea5852f96ecb15349970bd2f2e6253718020", 0xb7}, {&(0x7f0000001340)="2bd83115bc31ea20166139dc9f988ddd40ea12c6857d581aefa51071606f8530f165a9b16de599550449a3a028559bffd8a37732d566a0c75d59fdc05d40ec18b49f", 0x42}], 0x2, 0x0, 0x0, 0x20000080}, {&(0x7f00000013c0)={0x27, 0x1, 0x2, 0x6, 0x1f, 0xc0, "288c8de03082fb4794e1c53c7cca7f9dc374c9cc2520133043ed55b7387a7fa4aca8282bc3eb7fb9cbfb06ebe38d32a10091f31544e07556354c6406dde4fc", 0x2f}, 0x60, &(0x7f0000001980)=[{&(0x7f0000001440)="1baed66dab183c93045abe5724cf509cc08ea086480f5648a83e1715204c4c64d5604e98d442ee42eb09097eb3a3740906bf23b9d399be5397f7ee131bd2aaeecf273767087c83d7af19d64be540e99d99743dd14ed46517552c21f1e63536c461e4701c8d8ac99e2fdbc3c4fd3bb03ec49b244d2c6b795099fd7e7ef70051fd27ab54ad7be95f79b462124a803495aae4e40928ea6eefa840d08e0298cb38c285b8364fb64aaae9980cde11d11c5c8894a6662c85f3e3af8f52", 0xba}, {&(0x7f0000001500)="7ecee5e4820b0b1b8c980a07634166dec469d8c52bfd058c0c63de971b2a6dd053bbfbe46177ece0bfbf96f210d1e078e493e7afbde7dbf8c7716ceade4534aff681e3f03fab038576b4b72d47f35b9d1b952cf05b5ab1102f635d794a0879a013f33fbad9ec40d43dc9", 0x6a}, {&(0x7f0000001580)="8d10be3d69eda435f9bd69787029a90c964cb865813a972ac557aad38df7afb7a815608872590a8a44be88e46e2be29adf5b70f2e2c46f5fc443a0aef1c5c2d2fa86c14bd03cd90500047ddfa23901e7217bfa3a1786db86d4bb6d4d3b45c0bee8d6d0f16e1d135b44c56aab18c2cc25e332a0cc77c08316f9c659d58f060979ac2e9a25a978ac977ebbcd0f649a8fa97e3e81564c4dee3e57d3121f49e8f832f34660067ea6885bb4e171bb53f66405249fa6cadc1e788b9e79e5ec190d41615a001aea04ebc6008afddbe8d3d91297f48ce1fdf32caf1fbf8810365dbc380563e1a2e2c5750c7ccd8b3307", 0xec}, {&(0x7f0000001680)="0f0d2fd8679b32ef642526d6304293a066a0c0b11b9398eb63011703bfbc83696ff378f34b6f0aee36290f0149edc65ff6719d2a9d616c6f598116662d94cf370e3d65bfc9438e08e0f7ef", 0x4b}, {&(0x7f0000001700)="7386a1f1042bc08ea25210e60c52f6f69a04dae81bd30dafa59c289ed5476b228d430b65d41f6f441d45ff40a8542ba1d23caed204a97bdf3e454ac24c41ee82c7dba370c8738a691035c0e7479abeede5322a6a9363d0e90a5c1db40c4696ae9475526d7b7a329411e9128b843f8c70e2e677b0eb46b204", 0x78}, {&(0x7f0000001780)="0830cad03508597650a5d33b75c10282b489e8d49459ddd063f2cb52ad89a3fc50414786d26be6f1a9c6a83d8688d3154b457cf3e5ec0f5610ce6070c7a9f71887e817cc12795e8d75ebf34240605eed6ab1323a0fdaaecbd370146c1678f96250e2d7c356ae933b506c5c87331fc7d51121d673b6d8a4a42a2093ac8051ac1a5c068d1ae4c2162b69da8154f633ea6292071f3a21f1bd8f1a92181f00487c3e50ba491c956a8791eba6583cfb53db96e5084db795cc9ad9571d3aa0aadb480a56ea7be223508ae4c3328c1cd4e9c889094a31b01a6561bbffe1ba554e", 0xdd}, {&(0x7f0000001880)="0388f58c84b0b82db12bde330dc3105d2231ece8d0af7b97cd68b691b87097becef8d27ad230a1ce4e80dcb5cf170095a373dce292012e3ca9f0714bfcf8d7fb480e5e77db9ed28afefd1875cb592122b71d50ac206114642f2b1cf58b74c62be85d64c5dcde1f029d70d4de175005acf9f9a46bc2767f822c1cb6d060b9ecfc66509e4c47503b09cbee5a1858dc7983602bcbaa9d684688c8316a4fb4e23e875e2158342fefde0886cd0258218cce79a6900dff1630d2235b41421c87e5980f89693861cdc2585d50ccadacb7ebac7d56547a069fffda7a0adef2c847e98904a5e6523b7ef4c20c7681bb9c0c1935c921bc1710b15b5ec74a", 0xf9}], 0x7, &(0x7f0000001a00)={0xd0, 0x10a, 0x5f8d, "2aa248f8a1e95706567eec26898ba04884398dd9a9ebaf32699d0e7614bbe16cedd8faaefd70d8662224734d0ede73d2f8fbbbf31462c3e2e4615faa6ea49f051c7bda5c32b9bf43e3cd4c5d0dc93c1d61ce027f2877d52ffdb4fe4096b382e0a95db106748752af27ead4a8c256cfede422d983682d0dddc4c9d9741cedcf2700582b92623ba0864f2532a525209ffb974107a2fcd8cac4a8b19d16845aef4e716ef0d887f88acdda153e213e46eed6e63dca0219a55661be5c1f7975bd470f"}, 0xd0, 0xbf3b91e5ec9f3a0d}, {&(0x7f0000001b00)={0x27, 0x0, 0x1, 0x5, 0x81, 0x4, "0ebf9b267b5908142399ed2c0a2d3beeb83492d0aed7fcd3c886c7a1ccd8f202953f5cc8981c309ce13121e5d849a29174e0391250721356ad1a7647a0c134", 0x35}, 0x60, &(0x7f0000002d80)=[{&(0x7f0000001b80)="12ffa68d82d6f608c6c2e20448c4d8f3a2a65e14d0a5bc9d6c0d14957cc40b29a380c072cab3cd2bbc47386f51fc153a7b68fc95dbc590859a071be684aebc2d81ea963b16229e32564b82a2bc054a90a450ca9af2f084fed080b9a75bdaa25896c0994b55246a5e84afe4c700d177af1f9d140c0d61c41f90e81555d2fe2ae8891b6b66f9659eb3e0e832a0f11c4041e35fabc5541a07c59e4f052a1f96f9f8ea64c51fe33c6ae239535f08eb9877855a1b287e919f9e34af282bd8b539fbbb035c51b61a0926961ebd7eaf89f7f22b20ba2f624fc8bc32da22deaeed2ca5ece109e4e95fd89ba5c9c501faea", 0xed}, {&(0x7f0000001c80)}, {&(0x7f0000001cc0)="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", 0x1000}, {&(0x7f0000002cc0)="35e6a6080540f6f288ff6235f029782becd688ebbac01364fea6dcee0442e05a5ace19ba924b0c0dd3bef793be858e6e23110c5ea080356f1c50be15aedbf90624477e2a069ac68a0333bb6b9b6506873dec369ae8a6905a9e1b80e08b196ac4ff0d6f3624d15cd590f3cb5b2cec1c5ce8915a8b99430ef40cbe3dec75507a0a7c9f3de4a2b78fd4f1ff1d4b50beafff1c7619e3f220c36cc411811895db254efe209349ac9b76acf06de69211f3c571b1de3a787522", 0xb6}], 0x4, &(0x7f0000002dc0)={0x38, 0x19a, 0x5, "e942174563633e11e598d51e80e1166b9e455d60b4a772e2620cdf8b3a6b3072a4974e108b17a78a"}, 0x38, 0x8054000}, {&(0x7f0000002e00)={0x27, 0x0, 0x2, 0x3, 0xf2, 0x4, "4da7dd83e7a070824774c3f9db8a48612077584fb971902f7aef1b8a97a45451f3e62e407c5183f63216637de5dbf215704a83446b4bc3d6e7f61425ddc475", 0x30}, 0x60, &(0x7f0000004f40)=[{&(0x7f0000002e80)="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", 0x1000}, {&(0x7f0000003e80)="6c634f1c39c78216e7615c4d02b14373b8340c0328bbce47caef4a16baf3024bb9b9619919d01aa9cc113498a0c842b2c2f5bd61b224c837dccb393dcf129d95dfc573ca3d94e0b7ba53a542998ec2886ad9cbd306b18bdf11c548b31ff91c0d33c96a79c841c6e7837b44a5f5256a3931a8b369e2484875e113cd17439e9c116ee1fbdf2de536905c54a4fdf6573bf0edd60a291bd0e713dffbd44a7f315086826ef025", 0xa4}, {&(0x7f0000003f40)="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", 0x1000}], 0x3, &(0x7f0000004f80)={0x98, 0x115, 0x0, "8c8052e1ffcaf985faa21562f056877694a4e6840ab0f3fb174708cd4735b2321c46bad7a6c7680eb77496e6c93d9a47d4be3ee13669a39b7a7c66bff3257786e9e7de27c94f8f4fde1b2610269247bb9be709827a4d6d91f6aa26af55a4676521f91b966498c2503ef98e5bccff43eca9b336012101d05cdd29ae22fee7ca80cf1f0fa015a0"}, 0x98, 0x8000}, {&(0x7f0000005040)={0x27, 0x0, 0x1, 0x1, 0x9, 0x7f, "cb66a5458de19ce9e57171659562f39c798167b44e2af006927dc46fb4231138cc63781ae969e2c15f5b2ab5197447c2b0bea844ebb47c5faf9dd1d28b9f71", 0x20}, 0x60, &(0x7f0000005240)=[{&(0x7f00000050c0)="2fdef832afa3b93c7a471d90a0ecbb776a44616126e0e153d78d613cc35eb7792aa289298ef68245659773c72f5199f9020cf11f877327def909cb3d2adef35b5fc17077085b7ee30593358e26d9701f2c42dfe2144bed31aaba221c61c70873a5da", 0x62}, {&(0x7f0000005140)="e17c8445918c14de0762e46cd61f355d620a2c132f1985e6dff9d589a4", 0x1d}, {&(0x7f0000005180)="f97eb9ba21c4928d452b753cf1f7ade8cde6a8daf94cf188352188056597d4b96979f7b45cc0e3c9d7bbc3845e09082e74efd6853c1c99d044275bf0565c019ae7997920ead0543a3a1140fb6cafd1ea8540822b3be8579ed292f75b8fc78908cd33015737ef2d8c3f357527bab3c7984e6c9d764fa25cde60bad63ed643db3299cee2da988161187ce83698f862960ba3ae1a5305c33ec0b363d3f58be812aa99ea2375e9f3924e6de74a524cd0bcb897743d192e6650cbc2c12a", 0xbb}], 0x3, &(0x7f0000005280)={0xc0, 0x6, 0x5, "d4e0fa69c1a732c04701e40daa03bb7d6c42246ca8e07f590ddc0f45093147a26e43c7d26d2ad4f8197fd2d20cbb2530fa621213d768ed663e2aa940df454c5f3fbe85c13e985b3bc0a2c3bc5302f583d16e7c9518d86c7313a7c00c2060e334cfb0ff70185444b2faca8f0b3f6ff8a8ed4c5108311654b32edeca943eeb5d15b466a9bf1e41945690f5b398bc0d93838a3c5c13115749d9800c83274cac0b07673ee7328821b8db923ac3d5"}, 0xc0, 0x20080006}, {&(0x7f0000005340)={0x27, 0x0, 0x0, 0x7, 0x74, 0x7f, "cea130b34453312843aaaff94b77fd623d5f52d653adc912ff6cc0177e68561c8204e2e2b07b6092fca5e4e0c1abe09cad6093323c65432948b9dae163013e", 0x2f}, 0x60, &(0x7f0000005440)=[{&(0x7f00000053c0)="41a53aef30e6d36b6e", 0x9}, {&(0x7f0000005400)="bcf175f65462ef9bc437697f825582945c141fc98775da6609a349ab82763e331ae582ae0f63", 0x26}], 0x2, &(0x7f0000005480)={0xe8, 0x3c, 0x6, "6ac7427c44fcd723a44a6e586193764fd49ccb84d7b04f30bedf514cb116390bddc3577044f5ad3c3364e56a4f4f0faf6eb9809f21c9b5b19905080432a667b45d21999d943d88c7ec981ff572440c327731c0dc3f931a476108102451c4045a50bb4b3181bdb85ec306d0adc2414877205ef8bbb3585c3ee9c64bff45da73064f50b7f9ce85d64a8db70a33b8c77e7954992d8cde158922f0ccb2335966eb06cc6b2560c0426a529e693f8116798f8dbb342ec1acaf249bdc22aa50e684111c91641806540fcdfbb01a981bec3f2412a6cfc7fdbc78e871"}, 0xe8, 0x8011}], 0xa, 0x8000) 04:19:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x41}, 0x0) 04:19:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x37}, 0x0) 04:19:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000001b13582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700ca01053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockname$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x42}, 0x0) 04:19:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000030082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x38}, 0x0) 04:19:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x8f, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x43}, 0x0) 04:19:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x39}, 0x0) 04:19:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000000c3582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x44}, 0x0) 04:19:20 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x100000000, 0x80180) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f00000003c0)="699dcfb9fb29441f502aebf5edd75f9fb0aae2a3e5fe3ba115b286163e410727567e0166fb63f6b8c0f763e2a7c991dc52529071e604182d798820e04557e87285a27f9f841b958a2678a5d527027821ab1db94ec09ea209bf2995f5699e5b7004fdec", 0x63) rt_sigaction(0x33, &(0x7f00000000c0)={&(0x7f0000000040)="65450f380a24e1c40181e1aa76c98fa9f340abc4811dee900b000000dee1660fe33366660f383d8708000000460fa9c4425ddfb7f5000000660f3a0a484254", {0x4000000000000000}, 0x1, &(0x7f0000000080)="f34290c4c17b1089898c1c1a669ff65982c4c17c5b11f30fbd6d0d450f1a68f7f2df09c4a37d6b5501e3f345a5"}, &(0x7f00000001c0)={&(0x7f0000000100)="f3400f5f15000000000f38c8e9c4a15dd56200c4a27d3467000f7fbfdd46d0f5240b644408d0f326440f0fa000000080a7c48269de0a8f6978e2df", {}, 0x0, &(0x7f0000000140)="c44261bb9c6584120000c462f1a8ad6ee354c9c402f92a9bbb71000047d84a4a362666420f3a226ea453260f01ddc46211a82945ffcac4227935e9c4a3a10ae036"}, 0x8, &(0x7f0000000200)) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000280)='/dev/vcsu#\x00', 0x8d7b, 0x58204) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000002c0)={0x764, 0x0, [], {0xcf91a6c645584ba0, @reserved}}) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) fstatfs(r3, &(0x7f0000001280)=""/4096) 04:19:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3a}, 0x0) 04:19:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x45}, 0x0) 04:19:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0xd15ad2fc893a02ec, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) dup2(r1, 0xffffffffffffffff) 04:19:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3b}, 0x0) 04:19:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000b40)=ANY=[@ANYBLOB="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", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="0d000400000000000000000000000000000000000000000000770000000000000500000000000000000000007001000018026ce9f700100000150000f8020000f802000800000000f80700000005000000c71d83d8aefe1dbdfc7ac512542dac04f604afa059451b653e8b3e9ab8a5e8baecdbd60615b708544382726e5e672cd8ca0516a43184dfb1eb4432f339715723f9cc3f9ec886b054da4ebcfbdc301868b1dc00000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000140)={r2}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8000, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) ioctl$LOOP_SET_CAPACITY(r5, 0x4c07) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000640)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r8, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000, r1}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'lo\x00'}, 0x18) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700c00e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x46}, 0x0) 04:19:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c0000001a4882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:20 executing program 3: removexattr(&(0x7f0000000700)='./file1\x00', &(0x7f0000000740)=@random={'trusted.', '/dev/loop#\x00'}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000006c0)={&(0x7f0000000080)={0x27, 0x0, 0x2, 0x4, 0x40, 0x3, "709453fa05c6120c628a1e6bb41deb90a85313e9b4115df77aaddf73742560819c6eb0a221b792949b533ea3471e3f6223b12d7c448cc371fd6bdb38e03a5a", 0xc}, 0x60, &(0x7f0000000640)=[{&(0x7f0000000100)="e5d5e2a0ad53de7dc5f2364d6f8907da280db68c45ce0395da1ad35521df1e2ef26f323b6b8d7e303e77fa2ab7434cfb1c78bd4c4ab06356cb86e18190d8426a4f297043f9318fecf84636bbc7963dcabbe7444dd8f5494c5a774283c35848b4cb581880", 0x64}, {&(0x7f0000000180)="e12e0bd2d4965717142e55c2c2828e97544e0e5d4223890b5b096042925cdeee9c06852f6612c1875630964bc5fe1ce96ebcafef9e5dde68bca821ad79daf3c32f9a8386128ee90a937ecb3e48a4ef3b5cecd8e6c6", 0x55}, {&(0x7f0000000200)="bb96811ecb191f26bf28cd06d03062aed281d1423d7a63b369a91eae2db175d62493c4504c768a450f41d1617537815179445cd1c67861f235a49b0ac4d7f9cfd2f0a132bd49d3eea1240479e1eb86be3e915f5e0281f2aac7f04b94b6edf3a49c644f865b626cd17bb686388ca3e27dc138b198c730d42cdaa14375e7c2d5504de23c5b1995e98b0f", 0x89}, {&(0x7f00000002c0)="52b244120a94646eb7ffafe6319f35390dc9fe813a35f40f0bb305d75be2a8e631b3c446d748269749185118660295ef1d1678fdf353f7882e7ec0c1466f707db8320752e708e212934d7a5bd934f30ee418ce0dbb4f94c4f155bf98c7940e8f298796fcfb244063662150a74af2f7796f2e6456af14726c5164e8999b", 0x7d}, {&(0x7f0000000340)="ca95dee0ab1da92abdaddd5e578b693acbbea5f06a36e455fcfcf59661ae249e984ba08a55388cb8eae9dc925443e55b741b040018a4374dcd68bed1d4a99f3d20809b4b8803ccdfa3519dcdf3673711db6b0af2735b7df0065694db5fd94e420f63cc6719c2c5d023c9130ef232491ad4e0e185c5df7813bc785e51706664b472539d0e31883ca4873ea5313d3552a01e0cd8a8f8e076051b0ade2dab24d682a997d0d8aa47eb8054dab69bb275b6fd0811d1f339477a6203d7978257defdbfa761627319", 0xc5}, {&(0x7f0000000440)="d2dfe2168dcd51f20d917472a11078250bc4dc6653206aaed57a5698c8a393e29de79e0cf299932a0e4b402d3b867dd68b8dc74d806fbb6e310e4a7a09af0c6b8f35f6", 0x43}, {&(0x7f00000004c0)="7132e853a03aea0b603b869b9b7a64ddbad04d8c46fb210081aa5318e56452119ec2fc77b35c3276e50693dead0c2dd7caf7e95d25987fe3e280f1bca31abead9065edd90957e10a2298f8c3775cf6c06e07413d1adc73459dba6a690afd857d877bf4843af1fbdd121147ad0f2350c494be5155325bca21b13e8c1e6a93f60b71298c6b2270fed2bbfaed5b2d475541ae", 0x91}, {&(0x7f0000000580)="cb163a573e79860eb5a61df6b98d6f9d3c6d3dfacd46e3c1ab315138ae42a1ea8e932bebe04292d70371239a53e4827cb2b05556c82bd8bc6bf118b34ba3a451a37f06057f3025bbaa0d06885a7878d3fc90cdbcb29e95a3bff9ef9a7fc5ddd3921776611ec6efdda62e50155fd884aa0b3dce00383aea4ff73c65630f2964efa58742cc1ef38800f675ae57eb9ee81b99014bb6c573ff13b107b5f95c90b975e7e2c08925", 0xa5}], 0x8, 0x0, 0x0, 0x4000001}, 0x8000) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3c}, 0x0) 04:19:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x47}, 0x0) 04:19:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mq_unlink(&(0x7f0000000040)='/proc/self/net/pfkey\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = getpgid(0x0) fcntl$setown(r1, 0x8, r2) 04:19:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3d}, 0x0) 04:19:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:22 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x4080, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb8, 0x1, 0x2, 0x642, 0x70bd2a, 0x25dfdbfe, {0x3}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x4}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x2}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_TUPLE={0x2c, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @remote}}}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x3bcd2000}, @CTA_EXPECT_TUPLE={0x30, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}]}]}, 0xb8}}, 0x800a) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000300)=0x10000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) read$alg(r3, &(0x7f0000000340)=""/2, 0x2) 04:19:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x48}, 0x0) 04:19:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700012e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3e}, 0x0) 04:19:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDMKTONE(r0, 0x4b30, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x41}, 0x0) 04:19:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700003f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x49}, 0x0) 04:19:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 384.553055][T15329] xt_check_match: 13 callbacks suppressed [ 384.553067][T15329] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:22 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x8000) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r1 = dup(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x101, @rand_addr="74dfce7aab26d7c6bda9963b7b6a5b4a", 0x80000001}, {0xa, 0x4e21, 0x1, @mcast1, 0x10001}, 0xffffffffffffffff, 0xffff8000}}, 0x48) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r6) write$P9_RLERROR(r2, &(0x7f0000000080)={0x16, 0x7, 0x2, {0xd, '^}keyringppp1'}}, 0x16) 04:19:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4a}, 0x0) [ 384.893279][T15345] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 385.377411][T15355] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000040053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x42}, 0x0) 04:19:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4b}, 0x0) 04:19:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) vmsplice(r1, &(0x7f0000000740)=[{&(0x7f0000000140)="bf230f65718f29b28334739c61de67ef56afa5523a9d724c9f544c9ea10ca6d3ed4394e9d11616f2316252c022ca9b072d3628a2794bc81fc5fd53fed926951fdfe1e8314259896015844b22decf127da4b25055435db51b85aab15ca9a7a0ea094a683b8b69e85a978b9b75ac368fe3368732698463a08d77586e6285fef04c5190c687a0d8ececd2621aa104842696589e8af1039321f689c7888310db760fce316365412ad0288ffe64f2634bedddaa57ccd163db857f59b2b6416f39c12e3b20de05bb8e5a870cbb9296845ae3667e47d66e9eaabb0d42a7f0cda02b54e2a6", 0xe1}, {&(0x7f0000000240)="e18ff34980e2bb00a5006d36a9995ccbf7d289e0ea2c370aa8f86cd6864c3ef9ee3f4bb1e887f0150bdc158722c4260ba7c869591c5f016914aed6c4af57aa67cfac9df40a08d623b16bd7c2ed5c8adbb4be541faa12056589e99dbab7e4a92520d9a67917c3786f73cce3c48fffb1551590bc98ec8a3f818da3f4912786d858", 0x80}, {&(0x7f00000002c0)="6c7518e1df40c28749ec37192050383e186c8b7f7b86d9d8b22b877c236a13e2d6069d038cdbc143f40c67d7e45e42179b45c27bb913c411e4045cc8a29f852e56c448c510ae4d81b2761d85627e8da72475b1addd4309b882e0069d2726e43d04cf4b3e4a57039b4215dc4ae1a6a2ab279b7c2c8bc51f18162928b416c6ba3cc3ce48b905bf40294426b361650a3b9265f099bd758fb8588a1ccf83c3425f00bd172ad8688f0037afa6c9e29ad9a7660a3c909f3b05de4a93251ce125be247227e0d2cc801e359ab9b5c20af9e9", 0xce}, {&(0x7f00000003c0)="03ff811d2640e4842fe72cb6112ac4498ce69baf31060d05ab0fc775930941dd10cf21784114ada2e89f6422e53f423fcc6027a15ff4924a40ccd813f5f6556dc1c1b682ebe695758d8021eb37662b6f7abe4ca24522e006e95429f66e3333a8d35a9cddb271e023d5f498193de8a32c2091e559882641b59655b20c0054a1b40175a46fb74f388bfdde5910cb67e73faf10265914d2ecee091370", 0x9b}, {&(0x7f0000000480)="72b45c3daec348484fecd2dc64ebba938f7e8ab51e3110ebb670b5b41ab8aae7b1c68b57cbcae1364ff8768a19a38fda632163548b20c07d9602e2e9a1e69ec8df5970cd6b48a2512f72cf85ce9d28332e72c5ce262496e944c9dbfc8b80cf7931b4cfd0a06dac7217406a1242eb88dd125e7dbeff261d93768d1d8cb323889a0baf76c3f144a79edc9351e908b5b5deba296401e52d55579cd0670eaa0ceb4e995f9ecdc93b5035b942a1eb33a7c093ea5f7697e568eec2a983d1185cd5a98b86d6827f24d5", 0xc6}, {&(0x7f0000000580)="98eb927a49cf14ad4a6b4bc910a996357022864aaea9f98090b75f1372fd7cb7683b6fae3515cec116cde354e5313f9924c317ffa9490a7f54cb2f8bad33ec8418758636db356d9c795260c989848c3d5c54a9c0c32dd12ed441056e32f521d0bbcc7e57b93ed93e750e50677a1763e8c615fbec973037ffd8d21031ce2978ff77097f10c7cbdcccafa5ae18c34b3d93454f1a667540d35bcaeff25aec43ae006df29013523a0c3d00fd89d560add6b73ef4cc774d271a4202f73a348edf751e935da04ff683895823da4f2c8045df4d835c3484e15d1be9f7ba043d", 0xdc}, {&(0x7f0000000680)="eac1ed493369305d7579316b4ee770eaee6e04abe41d709e2eed5ff8b50ba8d247d96afece6e006dd512bc1e2e55db99e887a7b2080d5310f2be1a8dc40a2557391d0f87a92feeec384df0de01726790c7f8351483a42b6b3c82d7836540ccc7b426a5e4023610747af91217d1d1cf14f36d6d9e7ca50e681570d3ef3d7cfb65af1351edc3fdabd1fd4e66275ff75836d766107e8a570edf8e3febb3bf1fca", 0x9f}], 0x7, 0x4) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000a80)={0x7f, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000b40)={'bridge_slave_0\x00', {0x2, 0x4e24, @multicast2}}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) 04:19:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 385.535703][T15369] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x43}, 0x0) 04:19:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4c}, 0x0) 04:19:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 385.576571][T15369] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 385.609914][T15369] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 385.783986][T15385] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 385.819862][T15369] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000ec0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4d}, 0x0) [ 385.833693][T15385] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x44}, 0x0) 04:19:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) flistxattr(r2, &(0x7f0000000140)=""/15, 0xf) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070001ca053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4e}, 0x0) 04:19:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x45}, 0x0) [ 386.202783][T15405] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x46}, 0x0) 04:19:24 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070000f0053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4f}, 0x0) 04:19:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xa) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttynull\x00', 0x122600, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:19:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x47}, 0x0) 04:19:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x50}, 0x0) 04:19:24 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000002053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000002b40)=[{&(0x7f0000000140)={0x27, 0x0, 0x1, 0x6, 0x0, 0x0, "06336b6c9d74e34d34f1bb5db0d7d3a9460360fd5ffb6056009300660ef7e4104a4db5895d5425f117454250578be7c604c3874a140c453214dad901089e29", 0x13}, 0x60, &(0x7f0000000240)=[{&(0x7f0000002ec0)="6471fef879ba4464e9e3cce02ef84bd2b207cb94e3f902310958e1668acad09e67f9bfb3855a9db3cfb9416013b2c62ba2b570a2b8b2def34903a44d7bd28f751d9975a204beed31bb1a2d780b3af9b8043183e81f7ba976ccae39c59c6099e32e50", 0x62}], 0x1, &(0x7f0000000280)={0x18, 0x0, 0xfc22, "ab0dd3d5"}, 0x18, 0x400c085}, {&(0x7f00000002c0)={0x27, 0x1, 0x1, 0x2, 0x2f, 0x81, "02218a373c907ba10bfcb724ba32c84c2938cc82b36bd4976a5f3133cb4e1e0d12b9db9af211cf9de3dd60b2cb12386c84bd91094b39d3123389e8fa093805", 0x2d}, 0x60, &(0x7f0000000540)=[{&(0x7f0000000340)="47c0d3a1c4c6f9d6c27c2a663e4c7391a9edcb14a7dcebb468f0f8fcf0d5d0e6f2f558e96768f510c4c351e6bc2fcd687873f4d19949fd799eecd3c0ccbedb841253c7e355e93070412f6e26135bb39db7e423088f2f4256026e9a6f9ff1d2a001925548c4a9b2663bb8b61d7fa6e2f8388749ea5d8ea5885dcef9899e95a53af9876131718613a2ac40b8dc9021f91ab5ecfcb0fcf91cfa1b4ed1a0fc48b2bfd671f9b7e2b68555ac554162ea7bc14f7a3b16ba062a5b0bdbd370230ac661fe9a", 0xc1}, {&(0x7f0000000440)="145d95868d4b235cdadc95758bc87891f7443ec55fa1ef5373bf7d4633eb6137d813c57b555662cd730ff4070fd796e1bf03", 0x32}, {&(0x7f0000000480)="1837a4dc0f848489c826b19f5dfff492392032c85f990c191a1cfacbbfd01d3ac9af96d2dcc056dfdddf", 0x2a}, {&(0x7f00000004c0)="b4be5daff358f94fd0303df38958507660d9200f1106701a84f25a90b83721f0d4e540a3a05b0ae0ca20b7272da1e45d87591216661454b3e7f0311246877a8d27bc1047d283526cd201994c65084f8f3e95603ee9c07661", 0x58}], 0x4, &(0x7f0000002dc0)={0xe8, 0x8e, 0x7, "b203e6e228cb548b3401df346f74ed44611a49729c20b808808dba2ac1bdf9d02afee8669ea5d055cb0d1124405eaf131e450a2172208dd3be8f0e765f2e8ee601000100000000009a65e6c8446e65babc14553fa2be80dc7a11357c2a70c378abc8929fee82f5e8561195b22fac5db595a541318bcc77de5abe4acfe7c7a63705008fa27f8a2ccfca9cd4d45b5031d24de54715c4cb57ed35842d3c3bd289aa2cfd9484128f5950c1c3f6dc2d31e30906c2c5d433f1e36c49e519a4a36cec466971209eedd984318f34511cdc0bf7438aaa5c83baf3"}, 0xe8, 0x40}, {&(0x7f0000000680)={0x27, 0x0, 0x2, 0xa, 0x0, 0x8, "c2582352c4f6f236cd7044a00359b125a6ef43c985dfb7dabffae196e018b6bb4e861d64090cb5a3ed16526afbc3b1485c92d22658114df0498bc89e8e5200", 0xe}, 0x60, &(0x7f0000000c40)=[{&(0x7f0000000700)="9acdda5d87734ab4f41d79e5f8fe7bd3b0a9d0ee875c5c25b1aabdbcef17c4a65289de8097652a87dfe2f95b626ab90e723abe0d527c7659e73c01e2bd2f8e7e18f49a9f364b418c5701aae7736f9cd09c3c67a0e8026484acce82161b69492824280cd5502ba5786a4ae619a965452985ba573e8f41a943aa826fdeebe205115a0067e6bb1d34d3eae43c087aeac5c5c1005e091a1026f49d282d351215681b0804021d5c4999", 0xa7}, {&(0x7f00000007c0)="bb2bfd8593b138fb6f1386d24f82", 0xe}, {&(0x7f0000000800)="6ebd84984619249f40a1613d12295490b7804b8743d01ec1126bb895c07436231698eefc", 0x24}, {&(0x7f0000000840)="d783b812c62e503e1c303a5688667570658162d706fb448304399f99c87e7148d9e661d6cb8c508d640fb557677ee5302d184747e9acc160e0820ba9e39815db8dcb704f9f3c1b6b977d6ff3fda6cf1ede69b598445ff653d03dbc7cb32baa92f2c68ddf37a01ba535d10cbb18f41dbdc5f06a445d65cdb5b0be06b87abd43bdca3a5e770dd448e15c68683ba8315b64079570b5116dbcd8afa0d5bebb84cc443b33b8a176256e1b45e789b374a4ffa4f5503cccb3e6039741f29e202bf7518e783c64d85bf5", 0xc6}, {&(0x7f0000002cc0)="656adea40a9a9231d2e7f81d6e75b23f8f78e2cc88a9d59b5c490aff8bbd13a7cf9abb191c58a97eef0164581a3f5b3799be42105c77c2012d5c50d13964e12288df56f60c1fb202ed5573dac7d0611ea7f92cbf669abf46a2fd0737cd40d462015f8dfd2ec001f5e129242eefdf1584564683c8ac1ee88adf3dee372c754740975ccaa3c42ff5f34386bed5bda125784d2078e013f93a1aa11bfdf5d7311dace18badc53ff44921453fae5ec36bdef585eafb62b2c2f71b4c63b5f95183469aa9bd828c2a6713ac5197ba9cbf7e06", 0xcf}, {&(0x7f0000000a40)="2de2fbbb39e59ffa9a3df150b533120a8fcc2dbf8a518daf2ffa5e626ffe021717318c999a442c9b7d590ae8ad7eb5613af0c834b82f603ec95d08c35d7aeaceb406c933a76881fd8c7087b85bcbe8f4bd0c524300132b9ef24eaa0e2df192b19fcd731cbf8f3a0d353843ff7b63b2838308d25cd5cb1c3e82456e62911635", 0x18}, {&(0x7f0000000ac0)="ff1022d05e36ee8d3bd68c8d1b2c8dddf76209d3cc744c8958eb65422085f8d4175260429743663658436fcd05a1cdc799cadffbf597d3aeab63995dd986587a728b0779ab554ded26fbbd56b2a3a8de56845ebb7c7821f8395b35564b7a532c3687cd2f821b0b3aaf51d0eeabdd517948e3", 0x72}, {&(0x7f0000000b40)="934c61bbb163c8a652a01ba106f4de1ca136f7b82a16830e407cd3b11a9aa39a373ff9334520f3f08ebdba76c0b251df6ce6cf150497410bbe2f0c4f4a5e8aae71f9e326c0996b846edcf83386fef38dd84c9da5e920c6e32577e6612e3b3cd8360ff9", 0x63}, {&(0x7f0000000bc0)="fba1a7af42d9967e33cccc1418bcc654157b462644cd18110fcc07c01c3bda416d02d2af7b5961d41230f49a7721d331f6811342520c9242f4b756545d02ee151b06fef91686cdfe661cd774d8476c9234dddb9f142cc0d15043fb9b8175b37b088b47b2293e5bcc", 0x68}], 0x9, &(0x7f0000000d00)={0x90, 0x1, 0x6, "649a258df4ce1f3015be8819644fde620f7815ca00b983b0ef390ebd37b6d97881ec387daf58a74afa19c4d626342fa5fe97316dce4e51cb79d702f2fa2570f6654a96f93865db77f398dda363a4862190cdeb343bbf972c162b50f1027e9e53fcafc0e1f8918dcbaa3bf3f91d2c0620e2ce4666aaee646a4a666d5b42"}, 0x90, 0x40000000}, {&(0x7f0000000dc0)={0x27, 0x1, 0x1, 0xccd4a74082aa7e3, 0x3f, 0x0, "737a2cc4572c9278b3dd675c3eab4a60cb04e959f6cf3dc378af12903450f951a23b7f4e1cc5351a0c86b4fac3f244c6dc155eb9fe0fc30b4b5986e02a040e", 0x31}, 0x60, &(0x7f00000011c0)=[{&(0x7f0000000e40)="ec4f0b5d7933df80f1172d8b0f5084861427e84cda8ad76fa4a3bbbf84a27c75bcf5eb2bbdac6beb4a153591dcbc5a7182", 0x31}, {&(0x7f0000000e80)="050d09da9e51ddbcaead8fd44d7a14f2bfdda33e8991dcc802f63ec9772d6265220076dc7160cb817dea69f05110a58eb2c99dee553455074c6477142ca6b0b4e190667160a73d7dd1ca8a847def64149cc77afc0be2a5fa7e7f69c5be57c93e3ac625fcca350195c9229c0d54254ff1c0402d3632", 0x75}, {&(0x7f0000000f00)="c1e5b98d3b3faf12766ca7466bd58408c3ebea9db4b5c678cacbdd77126ecf155c9fc7fe3bf20bafa42d868b9e55de65ac36f7feae051d0d9d96f78b5b4532423d1b7c3ac1f0d3fa023ef33c7d595ba5bf06e4e1d8baacf61927e2e53b8ad86b0cc1762a43fc1b121d966fb9c15f1a003b8aa9e55a2657dde652acaba19a24cf01d7ae0eb7b1ad42801aaf5901661b348af343276fe8056eeade55756dd22eb95cc3da4fa59dbe108e415257", 0xac}, {&(0x7f0000000fc0)="237b2c359a968485a8cf2f130362939dfbfee2858f7e46dec4bec88825", 0x1d}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000001000)="a419868581f3e25a232b5fe3ef099126048eb0a9e91488cedeabd5d163fa5bd6286b47801ca35db7cd91754ac559b262e3129f7c01d09cfebc37786405d4e70e837799af67e4cfbe78d9f0e6d086604278e1f538cd37564830a3fd1b3e7800b30c42425304e14a68dcb58f17e1d46d0947e73926b1b6439bef7c75626ac87c0539b937a5012a1864f956b4ddf7db6b2a8aa0dbf0857047745dc9c1020fcb624f8cf2e8878f79c43fe4441b0cd76a6c42be0bf9013fdb", 0x8c}, {&(0x7f00000010c0)="7b3182a724b9e01235297e10f1140b1e4e9b9cb41541adcb398f9f4268756ef5152c54a29f86ef664c896afd68d736ce08e2627b70d41fa9934fdbf4bb107b7f7533faeda7f6879206393dcd437b8faee0c5a2ba00acd15b7b0dc911527a78bcb1f85b8b86117de3f7487e3d9ac8c0ebaf7090eae9baf38ef13aba803954aa42e70222e9fdba709ab0a1c17f46624ae68bbb6117a4a7c725fe5f242c5b4f1446c5321210c475eb5ba8e00f7769", 0x4}, {&(0x7f0000001180)="0bd9ce1212306549dcb13e408e5d8e8f1e5dfcd3c0147879c49ed2ed3a87e7db38d6b85e3ebabce7954d335d3b6deabcdf131714eaac61b67344b8", 0x3b}], 0x8, 0x0, 0x0, 0x880}, {&(0x7f0000002280)={0x27, 0x1, 0x0, 0x1, 0x6, 0x0, "2d2d8ef8994c9266d7ad68cd2cbd32abff14795fbf4df5f7ebc5696815c4818f7cd120c8b1241ef63db4b53fb4479e21f17b2f82fdb4586dbd66d2fbc1ca2c", 0x16}, 0x60, &(0x7f0000002340)=[{&(0x7f0000002300)}], 0x1, &(0x7f0000002380)={0xc8, 0x110, 0x4, "98e6da334733b44746ac0ad06eef1a6a4bebb62c2fad031a2f7d28aa18e47f683448366e62ae1d776d99e5bf4ce525474b9fac26489c145b4ce0ab83e1170eb6723fa6a8211ba1ea79790c51c923ff38215710dc3cc96ee958d0915dcee19e462b20046823568623f88a18409fa28939431f549ddc8c454c3e338045b4172cfae6c4acc6e49d752d2543abab11f0e9ccc6a5277438a72b1e4d198edea0bab7da6f4706e2d581dd2a5d4189daa177117dff6036af"}, 0xc8, 0x10}, {&(0x7f0000002480)={0x27, 0x0, 0x2, 0x85e793e262b5fdf, 0x1, 0x4, "acbb9aabae7002f39a84d054758b5ebdee8ef7b59748b0898076f24dd3c687b85b541d10e1d4b089824f5092ab973a3d520bf651752a8d83a9ad122ed6e6b9", 0x13}, 0x60, &(0x7f0000002a00)=[{&(0x7f0000002500)="ce18a8a08123c4c3cd049fd3f4fae7aa7c305c0aa5a40973d2238d8f60b4f62c654fe14848e6b6c8ed75943392877324370133a72d1fcd71c18a8f64ecc023d0c7a0c7268361774a0b4bdd0836488912222752", 0x53}, {&(0x7f0000002580)="bda82bd9c0e605d41fcedbb5b480340c713c93a47110674040abf6bfd7a8126088cd23bb227a339507d17ef5874ad890682acbcc1e2f17466a8da503b6969555a322df5bc8dcfef9583737ee0d1596661a5dff044fceffdace4137f8b01433ccf5774354d1fffd3563202a06f2fb9cb56d375773182002956b65787cc397a1b70ca37eb88378589549cce4067a01548052a8e684e78f3d7eb54081fb92c01099fda000ee3c3a93f5986e2fa2aba7068255d2b12cb2828c060680f1ef0923cf0421791b3ac205a5f0bcb2d61dfe3453c4989b44b5bf0af4616aec23e74771cf1a4d67fbae8da9e72a6d4d587e34e7ef73ccd8413079a9", 0xf6}, {&(0x7f0000002680)="d9fcf64dca40b3dfa0f423305d716a91bf8185d66f977d90a36878bfe62e5074ccf52352c9db80ed1dbf74bc80c6da7fe65317db78938cda951fedde22b254ec17aebbbef6333061f98799aebc7643666ff5c9593cba8ee0bc637ffe52154119add5137b5362d59a9aa2b41c7bc9e59e7b071c962541580fa1225445bbccc3db8a9563ad1d19eacefc15f72dd0fb71dc71484efea1c1fff8957e202f95f557f5807cbbe325341c32239b79", 0xab}, {&(0x7f0000002740)="9ea197dcab82fdff159899de7b5670745a266f35c0fd8ac8b33def7e5f9cb576278ad6d4677a67e1be92182eb283728e2566afffaae486edaf18b6ac258a709477b1ba7ece7f81af212543b870d81b2d91d7807c2f65ee8b9e06024d0f073ffb078b7af2a497ceed0577ada493f7255858150defdd8f7b13a1f162c7f607209b247dd91bd76b9baf9149db9354a74e073afeb7e887bf089860fd9b1fae51cae3d5", 0xa1}, {&(0x7f0000002800)="75e14257aa7b6d4465a2e505ff55899647e96a3377360c96246603263510f5638994af60d3112d3f13c483bb0990953adec4a985ca26335c45cf7850d495597f1cad86ae811499c93327451665ff8275ffe493f66522d8f146fc2e8f4e8f2d6e89d17a8b4e793227ea4814b270e0d98f8cc0b5caf58cdbedb07b54a5d77b517527bb9a3f35ea956397809f4ae18d035398ff1c1fed6110d0b22bdc07d8f24ab67aab38063f58ff3b94b4c7ee4ab732b6118e8f1badc225", 0xb7}, {&(0x7f00000028c0)="6c11c5ff072228d66c70e170b72fff92944601877d69fcc766d20e7e92e866999c15150beb2bee11e340ac3c36188701fc820510a0c162493ab5fcf9448921fe8f78758857361c6faf7b64383fcc99581f028eaf20aa054022f5374b6f9075c3134f96bed70f6db781e8c31b9f84550a94549b010618b5526f304df1d1a2fb948b5d3bf0e4ad155757355f5f46203b6882cc3cec44153e13e0b7107a9b3377f09d897dd4f44bce3b9e21d6", 0xab}, {&(0x7f0000002980)="f0991170a9fb6440eadd334f26e91be6436611fa51ece7f526b1010eda97af30336c4718816210b42345d5840e32ff8d91677b112753d551513ac11c1783df3100482133fd586f06999fdf553862f378506c566690e194", 0x57}], 0x7, &(0x7f0000002a80)={0xb0, 0x15, 0x4e64, "20aed1ef17cbb508bbd1d75ce5e463a8246527ad456bd927c27bc50b960f74ff935863e95ba2f8957333bf8f6e40e4f95cdb3fb1b5623c2b2050f505869c0afb4d8267864fd3d953268d08a1c441d42e276ce4ef03879a1c6c65a3aeb49ee9ca22d926e3958b75a6b8d2751cde845002017a288426494a9cc55cf3d86c6c1ef0b833fb7ff471054b58f1f0a4b9f7806b8b327dbf01d55cf69cdf076a3c3538"}, 0xb0, 0x40400}], 0x6, 0x2021) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x40010, 0xffffffffffffffff, 0x63256000) 04:19:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x51}, 0x0) 04:19:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x48}, 0x0) 04:19:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000003053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x4d3, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc040564a, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "41509547"}}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000140)={0xc, @sliced={0x8000, [0x48, 0x401, 0x3, 0x6f, 0x1ff, 0x0, 0x973, 0x6, 0xed8, 0xfffd, 0x1, 0x6, 0x1, 0x4, 0x7fff, 0x7ff, 0x2, 0x7, 0x7, 0x1000, 0x6, 0x420, 0x8, 0xfc00, 0x2f58, 0x1, 0x1, 0x8, 0x8d5, 0x0, 0x9, 0x5, 0x5, 0xffff, 0xff03, 0xad0, 0x3, 0x101, 0x2, 0x9, 0xffe1, 0x6, 0x400, 0x2, 0x800, 0x2, 0x7, 0x1f], 0x7}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:19:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:24 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000004053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x49}, 0x0) 04:19:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x52}, 0x0) 04:19:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x53}, 0x0) 04:19:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700000a053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socket$kcm(0x29, 0x8, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4a}, 0x0) 04:19:25 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000050f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x54}, 0x0) 04:19:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700000e053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4b}, 0x0) 04:19:25 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/64, &(0x7f0000000180)=0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 04:19:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400700000f053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4c}, 0x0) 04:19:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x55}, 0x0) 04:19:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:25 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000060053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 388.241569][T15543] IPVS: length: 64 != 24 04:19:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4d}, 0x0) [ 388.334247][T15553] IPVS: length: 64 != 24 04:19:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 04:19:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x56}, 0x0) 04:19:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x202000, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{0x1f, 0xf7, 0xfb, 0xfffffff8}, {0x0, 0xff, 0x4, 0x5}, {0x101, 0x6, 0x6, 0xd5}, {0x7f, 0x40, 0x53, 0xfffffffd}, {0x100, 0x40, 0x81, 0x85b}]}) write$binfmt_elf64(r1, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x2, 0x7, 0x100000001, 0x3, 0x3, 0x7, 0x321, 0x40, 0x3b7, 0x7, 0x101, 0x38, 0x2, 0x522d, 0xfffc, 0x7}, [{0x6474e551, 0x58, 0x7, 0x80000000, 0x80000001, 0x20, 0x5, 0x5}], "f81b444c5939544bd3f622261ab965f203605048ffc0298aaa880f4b32d311357320a34573be5f2ecf4da865e5e177cb6cd33505653f", [[], []]}, 0x2ae) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) write$P9_ROPEN(r4, &(0x7f0000000500)={0x18, 0x71, 0x2, {{0x1, 0x1, 0x2}, 0x1}}, 0x18) r5 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) ioctl$SIOCRSGL2CALL(r5, 0x89e5, &(0x7f0000000540)=@rose) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000180)={0xffff, @remote}) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) r7 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r8) 04:19:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000073582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4e}, 0x0) 04:19:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 04:19:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x57}, 0x0) 04:19:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 04:19:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x58}, 0x0) 04:19:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4f}, 0x0) 04:19:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xd) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000001c0)="99ca06cb87f8ae72b81ed0a10212656906dc8183c48d6e9e8303640b5cf3b3e87308a04424d4ef6df1789fc6293d2a40443252f43c335440a172c11c8614915f1b0ac62f29a331037e307fbe71952c127d364e621115e826a2cf4164e4bf9f3d74cb715d04bc3c2f030064116dc9c383fce9a59ab60e5ef8550838f09c5212baa3fa0b66fcabde246bef1112f6522a79584a0d", 0xffffffffffffff4f, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x59}, 0x0) 04:19:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 04:19:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x50}, 0x0) 04:19:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000403582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 04:19:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5a}, 0x0) 04:19:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x10423, 0x0, 0x2, 0x0, 0x5, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000140)) r2 = socket(0xa, 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r4, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000002c0)=0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e6174000000000000000000000000e9000000000000000000000000003a0d92610000000005000000900300000000000070010000000200007001000000000000f80200010400000800000000f807000064aab2a4f6bf0745784600020000050000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 04:19:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x51}, 0x0) 04:19:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000001b13582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5b}, 0x0) 04:19:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 04:19:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x52}, 0x0) 04:19:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$SIOCPNGETOBJECT(r8, 0x89e0, &(0x7f0000000200)=0x9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0xff, @local, 0x7}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x2}, @in6={0xa, 0x4e22, 0xfff, @empty, 0x9}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, @in={0x2, 0x4e22, @remote}], 0xa0) 04:19:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000030082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 04:19:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5c}, 0x0) 04:19:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x53}, 0x0) 04:19:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000073582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 390.174266][T15666] xt_check_match: 7 callbacks suppressed [ 390.174277][T15666] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 390.227754][T15666] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000123582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5d}, 0x0) 04:19:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x54}, 0x0) [ 390.579790][T15689] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 390.594513][T15698] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:28 executing program 2: r0 = gettid() capget(&(0x7f0000000040)={0x20071026, r0}, &(0x7f0000000080)) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/141, 0x8d) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200, 0x0, 0x5, 0x1ff, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x4200) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000140)={'caif0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 04:19:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x55}, 0x0) 04:19:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000353582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5e}, 0x0) 04:19:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x56}, 0x0) 04:19:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5f}, 0x0) 04:19:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a40070000001a4882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:19:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:19:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x60}, 0x0) 04:19:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x57}, 0x0) 04:19:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 04:19:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x58}, 0x0) 04:19:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x61}, 0x0) 04:19:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x47, 0x10001, 0x1) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_DIRENT(r4, &(0x7f0000000240)=ANY=[@ANYPTR], 0x8) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000540)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20020020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, r5, 0x0, 0x70bd27, 0x7}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2020041}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r5, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @loopback}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8800}, 0x4080) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:19:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x62}, 0x0) 04:19:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x59}, 0x0) [ 391.852378][T15774] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000051e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) [ 391.974630][T15783] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x63}, 0x0) 04:19:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5a}, 0x0) 04:19:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0xf) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:19:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5b}, 0x0) 04:19:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x64}, 0x0) 04:19:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x200000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x4d3, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc040564a, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x400000, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "41509547"}, 0x0, 0x0, @offset=0xfffffffe}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000140)={0xcd, 0x0, 0x4, 0x10000, 0x1000, {0x77359400}, {0x4, 0x5a03f72eeef1eb34, 0x7, 0x2, 0x0, 0x40, "35ad273d"}, 0x1, 0x1, @fd=r1, 0x5, 0x0, 0xffffffffffffffff}) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f0000000640)={0x40, 0x12, &(0x7f0000000240)="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"}) getsockopt$inet6_udp_int(r3, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b0000", 0x13}], 0x1}, 0x0) 04:19:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5c}, 0x0) 04:19:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x65}, 0x0) 04:19:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b0000", 0x13}], 0x1}, 0x0) 04:19:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5d}, 0x0) 04:19:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x66}, 0x0) 04:19:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x67}, 0x0) 04:19:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5e}, 0x0) 04:19:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x19) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b0000", 0x13}], 0x1}, 0x0) 04:19:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5f}, 0x0) 04:19:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x68}, 0x0) 04:19:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e3709", 0x1d}], 0x1}, 0x0) 04:19:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x60}, 0x0) 04:19:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x69}, 0x0) 04:19:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e3709", 0x1d}], 0x1}, 0x0) 04:19:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x61}, 0x0) 04:19:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6a}, 0x0) 04:19:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e3709", 0x1d}], 0x1}, 0x0) [ 394.100259][T15919] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 394.253722][T15919] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x62}, 0x0) 04:19:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:19:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6b}, 0x0) 04:19:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x8, 0x101, 0x675, 0x101, 0x81, 0x2, 0x2d}, &(0x7f0000000280)=0x9c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000002c0)={r5, 0x7f}, &(0x7f0000000300)=0x8) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0xff, 0x8, 0x6, 0x1, 0x0, 0x7, 0x400, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x29d}, 0x4701, 0xffff, 0x1, 0x8, 0x1, 0x80, 0x800}, r6, 0x3, r0, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:19:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x63}, 0x0) 04:19:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6c}, 0x0) [ 394.644572][T15953] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 394.763954][T15953] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000050f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f0", 0x22}], 0x1}, 0x0) 04:19:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6d}, 0x0) 04:19:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x64}, 0x0) 04:19:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0xb086060f1f3eaae9, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x109b80, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r4, 0xc0884113, &(0x7f0000000140)={0x0, 0x7fff, 0x1, 0x3, 0x6, 0xd11, 0x10001, 0x7fffffff, 0x8000, 0x5, 0x8}) 04:19:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:19:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x65}, 0x0) 04:19:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6e}, 0x0) 04:19:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:19:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x66}, 0x0) 04:19:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6f}, 0x0) 04:19:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x1, 0x3, 0x4, 0x88225ec10327b02a, 0x7fff, {0x0, 0x7530}, {0x0, 0x0, 0x80, 0x4, 0x0, 0x78, "65829dff"}, 0x80000000, 0x0, @userptr=0x5, 0x1, 0x0, r0}) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000001c0)=0x1ff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x18208340}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="9115deb70100010001a93fb5321f4e236d6af32e2b98e18c84e0ed076a11ed4bfe1f2609ef7ba1877f87658dd032148d06f76371022dddc097a38d3674fdd74a88e0991ce753aace7d8db228f600044aa6b54f6913de4b29798b424d44bdbeb56d45448f591c987043f4e5973fb4343f332f251cef48c6812b31fb7cd782f9e1a0ff729d6a8022cc223e27f7647952a813cd53770da19d07c1140a8b703aa9e8c8b144bfd40af1003bc2822e36682e9e7b1492ffaa97672d9c25891f0aa619a11933f85c9bf726c1a6a2bf1e0b0f555e", @ANYRES16=r4, @ANYBLOB="010028bd7000fedbdf25040000000800010002000000080001000300000008000200020000000800020002000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x20) 04:19:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700", 0x24}], 0x1}, 0x0) 04:19:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x70}, 0x0) [ 395.767494][T16028] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x67}, 0x0) 04:19:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) [ 395.909663][T16028] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x68}, 0x0) 04:19:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) 04:19:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x71}, 0x0) 04:19:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:19:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x69}, 0x0) 04:19:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x72}, 0x0) 04:19:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400b000000053582c137153e370907088000f01700d1", 0x25}], 0x1}, 0x0) 04:19:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x73}, 0x0) 04:19:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) sendto$rxrpc(r4, &(0x7f0000000180)="b7a1813a57911eedef7378357a02d6b92cd57136e2cd43112a6104fda0c2ca46a18c165f7a87f420d4c0991c2fff4463e6e7b04b38de40ee94ad17b82558ecd1564b21bc2b7fd85b5bd2e505c61ddad05142c5a939d898548b22a00565a3a9923ae06b709b536c5abb0dd2bc0c8772f7d03d104d8e72028455bf3ef23df1d96e5c966df3b90cc4584cc09190312e2c4233458d82426e59fddfc4d21473bb577d531795d059ea18b2c97ee1c98b9270cc689e6f073987e72bae989cd1e0fd50a562931e4ad893cec59ebfe0b0c993e4510d01edf90c8b36779c740544ce929adc5b8fe251b08b2039a652ef93934b5aecb1652832f28b6231", 0xf8, 0x5ee6401515fdbc0, &(0x7f0000000280)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xb262}}, 0x24) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r6 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000140)) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x6, 0x4) r7 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) setsockopt$netlink_NETLINK_RX_RING(r7, 0x10e, 0x6, &(0x7f00000002c0)={0x0, 0xffffffff, 0x8, 0x1f}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r5) r8 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r9 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, r10) write$cgroup_subtree(r10, &(0x7f0000000340)={[{0x2d, 'memory'}, {0x2d, 'pids'}, {0x2d, 'io'}, {0x2d, 'rdma'}, {0x2d, 'io'}, {0x2d, 'memory'}, {0x2b, 'memory'}]}, 0x2c) 04:19:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000052a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x74}, 0x0) 04:19:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6a}, 0x0) 04:19:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x75}, 0x0) [ 396.892668][T16093] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 396.913995][T16093] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6b}, 0x0) 04:19:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 397.020460][T16093] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x76}, 0x0) 04:19:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$SIOCPNGETOBJECT(r8, 0x89e0, &(0x7f0000000200)=0x9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0xff, @local, 0x7}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x2}, @in6={0xa, 0x4e22, 0xfff, @empty, 0x9}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, @in={0x2, 0x4e22, @remote}], 0xa0) [ 397.310801][T16127] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 397.324001][T16093] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 397.332952][T16122] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 397.496201][T16134] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 397.535995][T16134] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:35 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80800100}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="08002dbd7000fddbdf25020000000800010000000000020004000000000000000000d88b643161ff4099cdcc1c6516ff6712db233596963cdd1cf45fb4cb23e0113e545c54ef2daddf515bba0457b534a9676de85d956a4366526db805bfba927a4ad09d542e33ff4ab950b9d8129ee32d2d7f94ecd96a802b0ceafe85ae65616bd5baf67fe739ec70b0749e01154dc63e36eebff791e41630635905cc609fdfa2b2ddfde0442012c7ca54502c17e38ed32383edf3b10e948b016dc4cf3300c229c4c8333afa13c216d09c455c9b07e9299e37b182acc933fa32f5659faed58290"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x14040038) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000003c0)={0x79, 0x0, [0x100000000, 0x6, 0x3ff, 0x4]}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000140)={0x80, 0x1000, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) delete_module(&(0x7f0000000240)='selinux*\x00', 0x800) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000380)={0x0, 0x9, 0xff, [], &(0x7f0000000340)}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) 04:19:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6c}, 0x0) 04:19:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x77}, 0x0) 04:19:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6d}, 0x0) 04:19:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x78}, 0x0) 04:19:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$SIOCPNGETOBJECT(r8, 0x89e0, &(0x7f0000000200)=0x9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0xff, @local, 0x7}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x2}, @in6={0xa, 0x4e22, 0xfff, @empty, 0x9}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, @in={0x2, 0x4e22, @remote}], 0xa0) 04:19:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8044, 0x0, 0x2, 0x0, 0x5, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000140)={0x3, 'nr0\x00'}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137353e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6e}, 0x0) 04:19:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x79}, 0x0) 04:19:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370c07088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$SIOCPNGETOBJECT(r8, 0x89e0, &(0x7f0000000200)=0x9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0xff, @local, 0x7}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x2}, @in6={0xa, 0x4e22, 0xfff, @empty, 0x9}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, @in={0x2, 0x4e22, @remote}], 0xa0) 04:19:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6f}, 0x0) 04:19:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7a}, 0x0) 04:19:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0xfffffffffffffff8}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e371207088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7b}, 0x0) 04:19:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000051e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x70}, 0x0) 04:19:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e373507088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)="3669fea807c9c08cddd3fd34dc91c0090000e8687f388a84b471f2826405cc642a3369f672fa7649ea2df3c8f4", 0x2d, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0100000001000000b75d4ac6975fde1c1a9fef"}) ioctl$TIOCCONS(r2, 0x541d) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_int(r3, 0x0, 0xb, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 04:19:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$SIOCPNGETOBJECT(r8, 0x89e0, &(0x7f0000000200)=0x9) 04:19:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x71}, 0x0) 04:19:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7c}, 0x0) 04:19:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e37090c088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 399.277935][T16228] sp0: Synchronizing with TNC 04:19:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7d}, 0x0) [ 399.457072][T16227] [U] è 04:19:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x72}, 0x0) 04:19:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r2 = accept4$alg(r1, 0x0, 0x0, 0x80000) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000140)=""/183, &(0x7f0000000200)=0xb7) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) 04:19:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) 04:19:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370910088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7e}, 0x0) 04:19:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='team_slave_1\x00', r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000180)={0x7, 'team_slave_1\x00', {0x10001}, 0x7}) 04:19:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370912088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x73}, 0x0) 04:19:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x82}, 0x0) 04:19:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r9 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e63c5932300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2bc501000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 04:19:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x74}, 0x0) 04:19:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370935088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) 04:19:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x83}, 0x0) 04:19:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x75}, 0x0) 04:19:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e3709070c8000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 400.808785][T16317] xt_check_match: 10 callbacks suppressed [ 400.808795][T16317] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052682c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907128000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x84}, 0x0) [ 400.948753][T16309] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x76}, 0x0) 04:19:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) socket(0xa, 0x2, 0x0) 04:19:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x4a33d57d, @dev={0xfe, 0x80, [], 0x18}, 0x28f5}, 0x1c) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052782c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907358000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x85}, 0x0) 04:19:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x77}, 0x0) [ 401.315426][T16347] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052882c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e37090708b101f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 401.555684][T16350] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x86}, 0x0) [ 401.596040][T16356] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 401.661649][T16352] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x8, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000200)=0x186) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x121a01, 0x0) bind$vsock_stream(r2, &(0x7f0000000180)={0x28, 0x0, 0x2710}, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) 04:19:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x78}, 0x0) 04:19:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088001b11700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000200000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 04:19:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x87}, 0x0) 04:19:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x79}, 0x0) 04:19:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088002f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052a82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x88}, 0x0) 04:19:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) r3 = socket(0xa, 0x2, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x9, 0x10, 0x7}, &(0x7f0000000280)=0x18) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) r7 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) ioctl$LOOP_CHANGE_FD(r7, 0x4c06, r9) ioctl$BLKIOMIN(r7, 0x1278, &(0x7f0000000340)) ioctl$NBD_CLEAR_SOCK(r6, 0xab04) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000002c0)={r5, 0x1759}, &(0x7f0000000300)=0x8) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000140)={r3, 0x40, 0x8001, "154a41018019c35cc42512b35a690bba3a490a3ccddedb9237eb13efa1fc5421d220d7bf8604ba2cdf3c20814b9f294dbcffb59dd9d76ed9fc36c8e2f5e373f97305ae62ada4041d35d24835fdfebaa04a66cfafc6c8e1c204b6353cbddc07d22a1a29fbb63626949a9ab19b05c0ef2d4c82bd9ad413c69a47d49dfd5591a8accda675aae5573a0dd74cd893e9b42f01ad4c8fbb33a3e699433cfee3773381d4e648ef162be77fdf4113916d2945fa2d3f14ceba3f18c2dc331c87f27ed2a44f8424511b52b83dd1089d2494"}) [ 402.262661][T16388] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 402.345163][T16388] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 402.353481][T16406] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7a}, 0x0) 04:19:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x89}, 0x0) [ 402.387174][T16406] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088003f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052b82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) socket(0xa, 0x2, 0x0) 04:19:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7b}, 0x0) 04:19:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8a}, 0x0) 04:19:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052c82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088004f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./file0\x00', 0x9e20, 0x20) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8b}, 0x0) 04:19:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000c80000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000038004d41535155455241444500000000000000000000000000000000000000000100000000000000ac1414aae0000002fe084e2300000000e00000017f0000010000000000fffffe6970365f76746930000000000000000076657468305f746f5f6272696467650000000000000000000000000000000000010000000000000000000000000000001f000218000000007000a80000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414bbac1e01014e240065000000007f000001ac1414bbffffff00a592bb776970365f76746930000000000000000076657468315f746f5f6272696467650000000000000000000000000000000000810000000000000000000000000000006c000064000000007000a80000000000000000000000000000000000000000003800534e415400000000000000000000000000000000000000000000000000000100000000000000ac1414bbe00000010066d10e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800e0000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000e2f8e01000000004800534e4154000000000000000000000000000000000000000000000000000103000000fe8000000000000000000000000000bbffffffff0000000000000000000000004e234e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) 04:19:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052d82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7c}, 0x0) 04:19:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e37090708800af01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x20000, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) 04:19:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052e82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8c}, 0x0) 04:19:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7d}, 0x0) 04:19:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000052f82c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e37090708800ef01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8d}, 0x0) 04:19:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r7, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r7, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) 04:19:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7e}, 0x0) 04:19:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053082c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8e}, 0x0) 04:19:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e37090708800ff01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x82}, 0x0) 04:19:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x40, @ipv4={[], [], @local}, 0x7}}, 0x1, 0x2, 0x6c, 0x4, 0x2, 0x1, 0x36}, &(0x7f0000000200)=0x9c) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={r3, 0x7, 0x8, 0x1, 0x5, 0x81, 0x3f, 0x1f, {r4, @in6={{0xa, 0x4e22, 0x9, @empty, 0x10001}}, 0x5, 0x10000, 0x8000, 0x1, 0x4}}, &(0x7f0000000300)=0xb0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000480)={r5, 0x7f}, 0x8) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) ioctl$BLKSECTGET(r7, 0x1267, &(0x7f00000004c0)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000040)={r9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000380)={r9, 0x9d, "a0a47bd36b03b912947831c63a52caefabbc4565f5c3d83dde00977648cc45e3d8c6a86c6cf977e50e0ed2be793dfeb35bf1e8d989a4d159330d8db674b4618571a9aa52e879fc5e15e7c7fc9f3bece297b63362d0438d17445da5c363bf6837e6392d89c6d47f6cd805150b4747344d71059b66ba676706b3aa09ab19893b57c784b37e7ed0ad37e408c9ecdddc3bc5caa36b02c159708b8811cc843b"}, &(0x7f0000000440)=0xa5) r10 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x20000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r10, 0x84, 0x21, &(0x7f0000000540)=0x1cc, 0x4) 04:19:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x83}, 0x0) 04:19:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088060f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8f}, 0x0) 04:19:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053182c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r6, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x150, r6, 0x5, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc80cc162}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4000020}, 0x40) 04:19:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000005000000070000000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000fac00f534b4bf5949c1be828452bf0149baf2f4e3050d7b9c88555130b68afa2558100f7966f786d6ed01567aa76f1dd32b43d8cb6ded77b30acdd69b1d6ccdd873f47bf97495458c777fdbee9ce186bf365a559abc1575306ac7461c2819ad551571a12d0d0104a4722a9144589dd3f6b8aa64afd6903fbc65e07bf98177bd9260542c99334766eae4f3d73a17a", @ANYPTR, @ANYBLOB="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"], 0x3) connect$netrom(r0, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800c018}, 0x4000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) 04:19:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x84}, 0x0) 04:19:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x90}, 0x0) 04:19:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053282c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 404.341838][ C1] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:935 [ 404.352114][ C1] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 283, name: kworker/u4:4 [ 404.361259][ C1] 4 locks held by kworker/u4:4/283: [ 404.366629][ C1] #0: ffff888214c53128 ((wq_completion)bat_events){+.+.}, at: process_one_work+0x88b/0x1740 [ 404.376915][ C1] #1: ffffc90001cf7dc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 404.388953][ C1] #2: ffffffff89bae300 (rcu_read_lock){....}, at: batadv_nc_worker+0xe3/0x760 [ 404.398219][ C1] #3: ffffc90000d98d50 ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xe0/0x780 [ 404.407184][ C1] Preemption disabled at: [ 404.407205][ C1] [] __do_softirq+0xf3/0x98c [ 404.417740][ C1] CPU: 1 PID: 283 Comm: kworker/u4:4 Not tainted 5.5.0-rc5-next-20200110-syzkaller #0 [ 404.427285][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.437366][ C1] Workqueue: bat_events batadv_nc_worker [ 404.443008][ C1] Call Trace: [ 404.446301][ C1] [ 404.449173][ C1] dump_stack+0x197/0x210 [ 404.453521][ C1] ? __do_softirq+0xf3/0x98c [ 404.458128][ C1] ___might_sleep.cold+0x1fb/0x23e [ 404.463260][ C1] __might_sleep+0x95/0x190 [ 404.467903][ C1] __mutex_lock+0xc5/0x13c0 [ 404.472416][ C1] ? alloc_list_entry+0xc0/0xc0 [ 404.477332][ C1] ? tpk_write+0x5d/0x340 [ 404.481668][ C1] ? find_first_zero_bit+0x9a/0xc0 [ 404.486815][ C1] ? mutex_trylock+0x2d0/0x2d0 [ 404.491596][ C1] ? __lock_acquire+0x29c9/0x4a00 [ 404.496660][ C1] mutex_lock_nested+0x16/0x20 [ 404.501438][ C1] ? mutex_lock_nested+0x16/0x20 [ 404.506414][ C1] tpk_write+0x5d/0x340 [ 404.506446][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 404.506511][ C1] resync_tnc+0x1b6/0x320 [ 404.506535][ C1] call_timer_fn+0x1ac/0x780 [ 404.506549][ C1] ? encode_sixpack+0x790/0x790 [ 404.516430][ C1] ? msleep_interruptible+0x150/0x150 [ 404.516445][ C1] ? run_timer_softirq+0x6b1/0x1790 04:19:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x85}, 0x0) 04:19:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e3709070880f3f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 404.516468][ C1] ? trace_hardirqs_on+0x67/0x240 [ 404.516483][ C1] ? encode_sixpack+0x790/0x790 [ 404.516498][ C1] ? encode_sixpack+0x790/0x790 [ 404.516519][ C1] run_timer_softirq+0x6c3/0x1790 [ 404.516545][ C1] ? add_timer+0x940/0x940 [ 404.516562][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 404.516582][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 404.516595][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 404.516615][ C1] ? trace_hardirqs_on+0x67/0x240 [ 404.587793][ C1] __do_softirq+0x262/0x98c [ 404.592292][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 404.597190][ C1] irq_exit+0x19b/0x1e0 [ 404.601414][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 404.606955][ C1] apic_timer_interrupt+0xf/0x20 [ 404.611880][ C1] [ 404.614820][ C1] RIP: 0010:lock_acquire+0x20b/0x410 [ 404.620108][ C1] Code: 9c 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 d3 01 00 00 48 83 3d 69 c6 58 08 00 0f 84 53 01 00 00 48 8b 7d c8 57 9d <0f> 1f 44 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b [ 404.639704][ C1] RSP: 0018:ffffc90001cf7c80 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 404.648247][ C1] RAX: 1ffffffff13675eb RBX: ffff8880a888e000 RCX: ffffffff815a8e00 [ 404.656219][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000286 [ 404.664195][ C1] RBP: ffffc90001cf7cc8 R08: 1ffffffff16a2b9c R09: fffffbfff16a2b9d [ 404.672162][ C1] R10: ffff8880a888e8f0 R11: ffff8880a888e000 R12: ffffffff89bae300 [ 404.680122][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 404.688098][ C1] ? __lock_acquire+0x8a0/0x4a00 [ 404.693039][ C1] batadv_nc_worker+0x117/0x760 [ 404.697892][ C1] ? batadv_nc_worker+0xe3/0x760 [ 404.702831][ C1] process_one_work+0x9af/0x1740 [ 404.707765][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 404.713127][ C1] ? lock_acquire+0x190/0x410 [ 404.717804][ C1] worker_thread+0x98/0xe40 [ 404.722360][ C1] kthread+0x361/0x430 [ 404.726424][ C1] ? process_one_work+0x1740/0x1740 [ 404.731610][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 404.737322][ C1] ret_from_fork+0x24/0x30 [ 404.741810][ C1] [ 404.744292][ C1] ================================ [ 404.749385][ C1] WARNING: inconsistent lock state [ 404.754489][ C1] 5.5.0-rc5-next-20200110-syzkaller #0 Tainted: G W [ 404.762392][ C1] -------------------------------- [ 404.767495][ C1] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 404.774329][ C1] kworker/u4:4/283 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 404.780718][ C1] ffffffff8c365970 (&tpk_port.port_write_mutex){+.?.}, at: tpk_write+0x5d/0x340 [ 404.789730][ C1] {SOFTIRQ-ON-W} state was registered at: [ 404.795473][ C1] lock_acquire+0x190/0x410 [ 404.800100][ C1] __mutex_lock+0x156/0x13c0 [ 404.804762][ C1] mutex_lock_nested+0x16/0x20 [ 404.809596][ C1] tpk_write+0x5d/0x340 [ 404.813826][ C1] sixpack_open+0x8d6/0xaaf [ 404.818556][ C1] tty_ldisc_open.isra.0+0xa3/0x110 [ 404.823833][ C1] tty_set_ldisc+0x30e/0x6b0 [ 404.828637][ C1] tty_ioctl+0xe8d/0x14f0 [ 404.833129][ C1] ksys_ioctl+0x123/0x180 [ 404.837646][ C1] __x64_sys_ioctl+0x73/0xb0 [ 404.842321][ C1] do_syscall_64+0xfa/0x790 [ 404.846903][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.852864][ C1] irq event stamp: 5704900 [ 404.857410][ C1] hardirqs last enabled at (5704900): [] trace_hardirqs_on_thunk+0x1a/0x1c [ 404.867705][ C1] hardirqs last disabled at (5704899): [] trace_hardirqs_off_thunk+0x1a/0x1c [ 404.878020][ C1] softirqs last enabled at (5704742): [] __do_softirq+0x6cd/0x98c [ 404.887465][ C1] softirqs last disabled at (5704749): [] irq_exit+0x19b/0x1e0 [ 404.896550][ C1] [ 404.896550][ C1] other info that might help us debug this: [ 404.904591][ C1] Possible unsafe locking scenario: [ 404.904591][ C1] [ 404.912110][ C1] CPU0 [ 404.915373][ C1] ---- [ 404.918742][ C1] lock(&tpk_port.port_write_mutex); [ 404.924229][ C1] [ 404.927729][ C1] lock(&tpk_port.port_write_mutex); [ 404.933261][ C1] [ 404.933261][ C1] *** DEADLOCK *** [ 404.933261][ C1] [ 404.941406][ C1] 4 locks held by kworker/u4:4/283: [ 404.946653][ C1] #0: ffff888214c53128 ((wq_completion)bat_events){+.+.}, at: process_one_work+0x88b/0x1740 [ 404.956840][ C1] #1: ffffc90001cf7dc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 404.968812][ C1] #2: ffffffff89bae300 (rcu_read_lock){....}, at: batadv_nc_worker+0xe3/0x760 [ 404.977743][ C1] #3: ffffc90000d98d50 ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xe0/0x780 [ 404.986655][ C1] [ 404.986655][ C1] stack backtrace: [ 404.992560][ C1] CPU: 1 PID: 283 Comm: kworker/u4:4 Tainted: G W 5.5.0-rc5-next-20200110-syzkaller #0 [ 405.003484][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.013569][ C1] Workqueue: bat_events batadv_nc_worker [ 405.019193][ C1] Call Trace: [ 405.022520][ C1] [ 405.025427][ C1] dump_stack+0x197/0x210 [ 405.029751][ C1] print_usage_bug.cold+0x327/0x378 [ 405.034994][ C1] mark_lock+0xbb4/0x1220 [ 405.039360][ C1] ? check_usage_backwards+0x330/0x330 [ 405.044891][ C1] __lock_acquire+0x1e8e/0x4a00 [ 405.049734][ C1] ? __this_cpu_preempt_check+0x35/0x190 [ 405.055362][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.061622][ C1] ? debug_smp_processor_id+0x33/0x18a [ 405.067068][ C1] ? perf_trace_lock_acquire+0xf5/0x530 [ 405.072606][ C1] ? mark_held_locks+0xf0/0xf0 [ 405.077358][ C1] lock_acquire+0x190/0x410 [ 405.081872][ C1] ? tpk_write+0x5d/0x340 [ 405.086200][ C1] __mutex_lock+0x156/0x13c0 [ 405.090772][ C1] ? tpk_write+0x5d/0x340 [ 405.095086][ C1] ? alloc_list_entry+0xc0/0xc0 [ 405.100010][ C1] ? tpk_write+0x5d/0x340 [ 405.104324][ C1] ? find_first_zero_bit+0x9a/0xc0 [ 405.109553][ C1] ? mutex_trylock+0x2d0/0x2d0 [ 405.114301][ C1] ? __lock_acquire+0x29c9/0x4a00 [ 405.119319][ C1] mutex_lock_nested+0x16/0x20 [ 405.124086][ C1] ? mutex_lock_nested+0x16/0x20 [ 405.129021][ C1] tpk_write+0x5d/0x340 [ 405.133166][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 405.138705][ C1] resync_tnc+0x1b6/0x320 [ 405.143033][ C1] call_timer_fn+0x1ac/0x780 [ 405.147621][ C1] ? encode_sixpack+0x790/0x790 [ 405.152509][ C1] ? msleep_interruptible+0x150/0x150 [ 405.157866][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 405.163051][ C1] ? trace_hardirqs_on+0x67/0x240 [ 405.168067][ C1] ? encode_sixpack+0x790/0x790 [ 405.172936][ C1] ? encode_sixpack+0x790/0x790 [ 405.177809][ C1] run_timer_softirq+0x6c3/0x1790 [ 405.182841][ C1] ? add_timer+0x940/0x940 [ 405.187242][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 405.193389][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 405.198933][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 405.204912][ C1] ? trace_hardirqs_on+0x67/0x240 [ 405.209932][ C1] __do_softirq+0x262/0x98c [ 405.214459][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 405.219295][ C1] irq_exit+0x19b/0x1e0 [ 405.223440][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 405.228975][ C1] apic_timer_interrupt+0xf/0x20 [ 405.233994][ C1] [ 405.236924][ C1] RIP: 0010:lock_acquire+0x20b/0x410 [ 405.242324][ C1] Code: 9c 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 d3 01 00 00 48 83 3d 69 c6 58 08 00 0f 84 53 01 00 00 48 8b 7d c8 57 9d <0f> 1f 44 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b [ 405.262029][ C1] RSP: 0018:ffffc90001cf7c80 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 405.270439][ C1] RAX: 1ffffffff13675eb RBX: ffff8880a888e000 RCX: ffffffff815a8e00 [ 405.278530][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000286 [ 405.286489][ C1] RBP: ffffc90001cf7cc8 R08: 1ffffffff16a2b9c R09: fffffbfff16a2b9d [ 405.294538][ C1] R10: ffff8880a888e8f0 R11: ffff8880a888e000 R12: ffffffff89bae300 [ 405.302501][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 405.310473][ C1] ? __lock_acquire+0x8a0/0x4a00 [ 405.315574][ C1] batadv_nc_worker+0x117/0x760 [ 405.320413][ C1] ? batadv_nc_worker+0xe3/0x760 [ 405.325338][ C1] process_one_work+0x9af/0x1740 [ 405.330262][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 405.335642][ C1] ? lock_acquire+0x190/0x410 [ 405.340310][ C1] worker_thread+0x98/0xe40 [ 405.344802][ C1] kthread+0x361/0x430 [ 405.348856][ C1] ? process_one_work+0x1740/0x1740 [ 405.354039][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 405.359772][ C1] ret_from_fork+0x24/0x30 [ 405.364229][ C1] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:935 [ 405.373537][ C1] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 283, name: kworker/u4:4 [ 405.382668][ C1] INFO: lockdep is turned off. [ 405.387423][ C1] Preemption disabled at: [ 405.387441][ C1] [] __do_softirq+0xf3/0x98c [ 405.397974][ C1] CPU: 1 PID: 283 Comm: kworker/u4:4 Tainted: G W 5.5.0-rc5-next-20200110-syzkaller #0 [ 405.408889][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.419004][ C1] Workqueue: bat_events batadv_nc_worker [ 405.424916][ C1] Call Trace: [ 405.428187][ C1] [ 405.431034][ C1] dump_stack+0x197/0x210 [ 405.435427][ C1] ? __do_softirq+0xf3/0x98c [ 405.440015][ C1] ___might_sleep.cold+0x1fb/0x23e [ 405.445123][ C1] __might_sleep+0x95/0x190 [ 405.449621][ C1] ? tpk_write+0x2a6/0x340 [ 405.454028][ C1] __mutex_lock+0xc5/0x13c0 [ 405.458520][ C1] ? tpk_write+0x5d/0x340 [ 405.462842][ C1] ? find_first_zero_bit+0x9a/0xc0 [ 405.467944][ C1] ? mutex_trylock+0x2d0/0x2d0 [ 405.472705][ C1] ? __lock_acquire+0x29c9/0x4a00 [ 405.477822][ C1] ? __kasan_check_write+0x14/0x20 [ 405.482924][ C1] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 405.488527][ C1] ? wait_for_completion+0x440/0x440 [ 405.493802][ C1] mutex_lock_nested+0x16/0x20 [ 405.498579][ C1] ? mutex_lock_nested+0x16/0x20 [ 405.503511][ C1] tpk_write+0x5d/0x340 [ 405.507666][ C1] resync_tnc+0x22e/0x320 [ 405.511990][ C1] call_timer_fn+0x1ac/0x780 [ 405.516570][ C1] ? encode_sixpack+0x790/0x790 [ 405.521408][ C1] ? msleep_interruptible+0x150/0x150 [ 405.526763][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 405.531948][ C1] ? trace_hardirqs_on+0x67/0x240 [ 405.536960][ C1] ? encode_sixpack+0x790/0x790 [ 405.541806][ C1] ? encode_sixpack+0x790/0x790 [ 405.546652][ C1] run_timer_softirq+0x6c3/0x1790 [ 405.551666][ C1] ? add_timer+0x940/0x940 [ 405.556069][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 405.562211][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 405.567793][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 405.573810][ C1] ? trace_hardirqs_on+0x67/0x240 [ 405.578822][ C1] __do_softirq+0x262/0x98c [ 405.583313][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 405.588150][ C1] irq_exit+0x19b/0x1e0 [ 405.592297][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 405.597826][ C1] apic_timer_interrupt+0xf/0x20 [ 405.602743][ C1] [ 405.605682][ C1] RIP: 0010:lock_acquire+0x20b/0x410 [ 405.610959][ C1] Code: 9c 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 d3 01 00 00 48 83 3d 69 c6 58 08 00 0f 84 53 01 00 00 48 8b 7d c8 57 9d <0f> 1f 44 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b [ 405.630586][ C1] RSP: 0018:ffffc90001cf7c80 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 405.638993][ C1] RAX: 1ffffffff13675eb RBX: ffff8880a888e000 RCX: ffffffff815a8e00 [ 405.646952][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000286 [ 405.654912][ C1] RBP: ffffc90001cf7cc8 R08: 1ffffffff16a2b9c R09: fffffbfff16a2b9d [ 405.662899][ C1] R10: ffff8880a888e8f0 R11: ffff8880a888e000 R12: ffffffff89bae300 [ 405.670917][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 405.678899][ C1] ? __lock_acquire+0x8a0/0x4a00 [ 405.683831][ C1] batadv_nc_worker+0x117/0x760 [ 405.688678][ C1] ? batadv_nc_worker+0xe3/0x760 [ 405.693619][ C1] process_one_work+0x9af/0x1740 [ 405.698647][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 405.704019][ C1] ? lock_acquire+0x190/0x410 [ 405.708698][ C1] worker_thread+0x98/0xe40 [ 405.713236][ C1] kthread+0x361/0x430 [ 405.717292][ C1] ? process_one_work+0x1740/0x1740 [ 405.722502][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 405.728210][ C1] ret_from_fork+0x24/0x30 04:19:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x91}, 0x0) [ 405.773080][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 405.780278][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x92}, 0x0) 04:19:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f03500d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x93}, 0x0) 04:19:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r6, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) [ 405.855011][T16534] xt_check_match: 8 callbacks suppressed [ 405.855022][T16534] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0b101d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 405.954784][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 405.994896][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 406.007870][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 406.016138][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000180)={0x6, 'vlan0\x00', {0x9}, 0x2}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x94}, 0x0) 04:19:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x86}, 0x0) 04:19:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053382c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01701b1bd", 0x33fe0}], 0x1b1}, 0x0) [ 406.054788][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 406.081980][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, 0x0, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053482c137153e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x87}, 0x0) 04:19:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x95}, 0x0) [ 406.176687][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 406.181926][T16561] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 406.191519][T16561] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 406.199193][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:19:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01702d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 406.226870][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 406.256350][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 406.256442][T16575] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env 04:19:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137353e370907088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 406.278638][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 406.295772][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 406.309259][T16575] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01703d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 406.366963][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 406.389352][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 406.448963][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 406.478057][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 406.519208][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 406.529878][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 406.542734][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 406.549896][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 406.561890][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 406.565537][T16570] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 406.569046][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 406.580979][T16570] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:44 executing program 2: add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0xa000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, 0x1, 0x2, 0x10, 0x70bd2d, 0x25dfdbfd, {0x2, 0x0, 0x1}, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x2}, @CTA_EXPECT_TUPLE={0x70, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x29}}}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0xb}}}}]}]}, 0x94}}, 0x4001821) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x88}, 0x0) 04:19:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, 0x0, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e371007088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x96}, 0x0) 04:19:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01704d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x89}, 0x0) 04:19:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e373507088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 406.686168][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 406.711816][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 406.722507][T16611] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env 04:19:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0170ad1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x97}, 0x0) [ 406.761819][T16611] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 406.789766][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env 04:19:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0170ed1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8a}, 0x0) [ 406.812446][T16618] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 406.820657][T16618] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 406.826778][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 406.893612][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 406.901685][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 406.932013][T16618] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 406.955618][T16628] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 406.967932][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 406.999084][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 407.027550][T16616] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env 04:19:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) fsetxattr(r1, &(0x7f0000000140)=@known='trusted.syz\x00', &(0x7f0000000180)='louser+\x00', 0x8, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370902088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8b}, 0x0) 04:19:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, 0x0, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f0170fd1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x98}, 0x0) [ 407.042733][T16616] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.059982][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 407.077366][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 407.120264][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 407.145379][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 407.157131][T16646] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.171616][T16646] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01760d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8c}, 0x0) 04:19:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x99}, 0x0) 04:19:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370903088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f017f3d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1b1", 0x33fe0}], 0x1b1}, 0x0) [ 407.280048][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 407.315538][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 407.351939][T16642] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.353521][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.366797][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.369992][T16642] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.378656][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 407.394693][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 407.442108][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 407.449292][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 407.478858][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.486101][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.498244][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.505451][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.517070][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 407.524274][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 407.536401][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 407.543594][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 407.555014][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 407.562198][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370904088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9a}, 0x0) 04:19:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8d}, 0x0) 04:19:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r5, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0xf}], 0x1b1}, 0x0) 04:19:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370905088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0xec0}], 0x1b1}, 0x0) 04:19:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9b}, 0x0) [ 407.705992][T16683] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.734885][T16683] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8e}, 0x0) [ 407.773056][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 407.805105][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:19:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8f}, 0x0) [ 407.850720][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env 04:19:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9c}, 0x0) [ 407.911009][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 407.960224][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 407.982205][T16689] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 407.989465][T16689] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.991792][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 408.040005][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 408.048336][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 408.063206][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 408.070357][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 408.082894][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env 04:19:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f0000000200)={0x56, 0x4, 0x1, {0x3, 0xffff}, {0x7ff, 0x1ff}, @rumble={0x0, 0x9}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r3}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 04:19:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x482e}], 0x1b1}, 0x0) 04:19:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r5, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x90}, 0x0) 04:19:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370906088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9d}, 0x0) [ 408.090044][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 408.101449][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 408.108772][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x4830}], 0x1b1}, 0x0) 04:19:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9e}, 0x0) 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370935088000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x91}, 0x0) [ 408.177607][T16715] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 408.211805][T16715] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 408.257450][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 408.274733][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:19:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9f}, 0x0) 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907358000f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 408.463296][T16712] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 408.470542][T16712] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 408.496421][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env 04:19:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) r3 = dup3(0xffffffffffffffff, r2, 0x80000) accept4$x25(r3, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f00000001c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, [@NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0xe6}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x4) 04:19:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x92}, 0x0) 04:19:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0xa, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r5, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x34000}], 0x1b1}, 0x0) [ 408.517549][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa0}, 0x0) 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e37090708b101f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x93}, 0x0) [ 408.585116][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 408.615072][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:19:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x20034020}], 0x1b1}, 0x0) [ 408.640533][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 408.648078][T16752] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 408.659283][T16752] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 408.676154][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa1}, 0x0) 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088001b11700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 408.677068][T16758] x_tables: ip_tables: icmp match: only valid for protocol 1 04:19:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x94}, 0x0) [ 408.717256][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 408.729218][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 408.745453][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 408.754646][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088002f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 408.769761][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 408.801250][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 408.852047][T16749] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 408.859624][T16749] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 408.866207][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 408.878330][T16772] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 408.885023][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 408.898565][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 408.917250][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x95}, 0x0) 04:19:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x7ffff000}], 0x1b1}, 0x0) 04:19:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa2}, 0x0) 04:19:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r6, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088003f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x286a57d5, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x92, 0x9}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x220080, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x60a101, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x101401, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x8, 0x580) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000140)={0x1}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000180)={0x2}) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r7) [ 408.942994][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 408.969790][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 408.982788][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 409.010815][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 409.053006][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 409.060195][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 409.089429][T16787] PM: hibernation: Marking nosave pages: [mem 0x00000000-0x00000fff] 04:19:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x96}, 0x0) 04:19:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088004f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa3}, 0x0) 04:19:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0xfffffdef}], 0x1b1}, 0x0) [ 409.097899][T16785] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 409.112957][T16785] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 409.124564][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 409.129413][T16787] PM: hibernation: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 409.137082][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 409.172954][T16787] PM: hibernation: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 409.183642][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 409.197198][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:19:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x2}, 0x0) 04:19:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e37090708800af01700d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 409.223338][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 409.257242][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:19:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa4}, 0x0) 04:19:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x97}, 0x0) 04:19:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r5, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) [ 409.319172][T16787] PM: hibernation: Basic memory bitmaps created [ 409.338982][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 409.347160][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x3}, 0x0) [ 409.377327][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 409.384776][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 409.415198][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 409.427091][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 409.440390][T16786] PM: hibernation: Basic memory bitmaps freed [ 409.456995][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 409.464733][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x98}, 0x0) [ 409.477592][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 409.498231][T16787] PM: hibernation: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 409.514033][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 409.524633][T16787] PM: hibernation: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 409.534553][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 409.539025][T16787] PM: hibernation: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 409.541721][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 409.562141][T16804] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 409.569344][T16804] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 409.583932][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 409.591091][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 409.593599][T16787] PM: hibernation: Basic memory bitmaps created [ 409.612927][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 409.620092][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 409.640087][ T4259] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 409.648361][ T4259] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 409.665487][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 409.675592][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 409.688006][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 409.698754][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0xeb, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e37090708800ef01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa5}, 0x0) 04:19:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x4}, 0x0) 04:19:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r4, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x99}, 0x0) [ 409.750430][T16787] PM: hibernation: Basic memory bitmaps freed [ 409.826066][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 409.853916][T16831] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env 04:19:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa6}, 0x0) [ 409.869054][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e37090708800ff01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x5}, 0x0) 04:19:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9a}, 0x0) [ 409.920450][T16831] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088060f01700d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9b}, 0x0) 04:19:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f03500d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa7}, 0x0) 04:19:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x6}, 0x0) 04:19:48 executing program 2: r0 = getpgrp(0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x1, 0x16, 0x4, 0x40, 0x7, {0x0, 0x7530}, {0x2, 0xc, 0x81, 0x7f, 0x8c, 0x1f, "3ed4fd2d"}, 0x3, 0x1, @userptr=0xffffffffffff7fba, 0xfff, 0x0, 0xffffffffffffffff}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={r4, r3, 0x0, 0x0, 0x0, r2}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='eth1\x00', r2}, 0x30) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0xffffffffffffffff, r5, 0x0, 0x0) setpriority(0x1, r5, 0x7) rt_sigqueueinfo(r0, 0x2c, &(0x7f0000000280)={0x2b, 0xfffff000, 0x7fff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r7) ioctl$sock_SIOCSIFBR(r7, 0x8941, &(0x7f0000000240)=@get={0x1, &(0x7f0000000140)=""/238, 0x100}) [ 410.185646][T16827] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 410.213419][T16827] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 410.257856][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 410.291900][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:19:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r4, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9c}, 0x0) 04:19:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa8}, 0x0) 04:19:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x7}, 0x0) 04:19:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0b101d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9d}, 0x0) [ 410.410663][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 410.441820][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1, 0x51, 0x1, 0x1f, 0x2, 0x3e, 0x0, 0x110, 0x40, 0x51, 0x7f27311e, 0x1, 0x38, 0x1, 0x7, 0x1ff, 0x4}, [{0x474e556, 0x0, 0x8, 0x0, 0x6, 0x8, 0x1ff, 0x4}, {0x4, 0x8, 0x0, 0x200, 0x401, 0x9, 0xd956, 0x2}], "f28989d75ad84197e5d925", [[], [], [], [], [], [], []]}, 0x7bb) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r4) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x440, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x80, 0x20, 0x4, 0x1}, &(0x7f00000004c0)=0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000004c0)=0xfffffffffffffd86) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r9 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000300)={@dev}, &(0x7f00000004c0)=0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000500)={r6}, &(0x7f0000000540)=0x8) r10 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r11 = memfd_create(&(0x7f00000001c0)='t\x01\x00\x00\x00\x00\x00\x00W\xdai\xfa\xd1\x81\x81ZA\xccJ\xd2\x00\x8c\xf3', 0x2) r12 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r10, 0x4c00, r11) ioctl$LOOP_CHANGE_FD(r10, 0x4c06, r12) write$P9_RWSTAT(r12, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) [ 410.474080][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 410.481264][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa9}, 0x0) 04:19:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x8}, 0x0) [ 410.534880][T16884] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 410.549557][T16884] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01701b1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9e}, 0x0) [ 410.599872][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 410.611136][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 410.622935][T16894] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 410.641144][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 410.659658][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 410.672677][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 410.681069][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01702d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9}, 0x0) 04:19:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0xde, 0x8, 0x5}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r4, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xaa}, 0x0) [ 410.763659][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 410.786842][T16889] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 410.794088][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:19:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x9f}, 0x0) [ 410.804591][T16889] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 410.806009][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 410.823390][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 410.893088][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 410.900272][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01703d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa0}, 0x0) 04:19:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa}, 0x0) [ 410.979063][T16917] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 410.992233][T16917] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xab}, 0x0) [ 411.032581][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 411.039764][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 411.061746][ C1] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:935 [ 411.071054][ C1] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 16924, name: blkid [ 411.079739][ C1] INFO: lockdep is turned off. [ 411.084504][ C1] Preemption disabled at: [ 411.084520][ C1] [] __do_softirq+0xf3/0x98c [ 411.095201][ C1] CPU: 1 PID: 16924 Comm: blkid Tainted: G W 5.5.0-rc5-next-20200110-syzkaller #0 [ 411.105690][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.115747][ C1] Call Trace: [ 411.119023][ C1] [ 411.121878][ C1] dump_stack+0x197/0x210 [ 411.126193][ C1] ? __do_softirq+0xf3/0x98c [ 411.130771][ C1] ___might_sleep.cold+0x1fb/0x23e [ 411.135864][ C1] __might_sleep+0x95/0x190 [ 411.140350][ C1] ? debug_smp_processor_id+0x33/0x18a [ 411.145812][ C1] __mutex_lock+0xc5/0x13c0 [ 411.150307][ C1] ? debug_smp_processor_id+0x33/0x18a [ 411.155752][ C1] ? tpk_write+0x5d/0x340 [ 411.160063][ C1] ? mutex_trylock+0x2d0/0x2d0 [ 411.164814][ C1] ? perf_trace_lock_acquire+0xf5/0x530 [ 411.170346][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.176580][ C1] ? debug_smp_processor_id+0x33/0x18a [ 411.182050][ C1] ? perf_trace_lock_acquire+0xf5/0x530 [ 411.187588][ C1] ? mark_held_locks+0xf0/0xf0 [ 411.192336][ C1] mutex_lock_nested+0x16/0x20 [ 411.197078][ C1] ? mutex_lock_nested+0x16/0x20 [ 411.202012][ C1] tpk_write+0x5d/0x340 [ 411.206151][ C1] ? lock_acquire+0x190/0x410 [ 411.210817][ C1] resync_tnc+0x1b6/0x320 [ 411.215130][ C1] call_timer_fn+0x1ac/0x780 [ 411.219700][ C1] ? encode_sixpack+0x790/0x790 [ 411.224640][ C1] ? msleep_interruptible+0x150/0x150 [ 411.230016][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 411.235030][ C1] ? _raw_spin_unlock_irq+0x23/0x80 [ 411.240214][ C1] ? encode_sixpack+0x790/0x790 [ 411.245105][ C1] run_timer_softirq+0x6c3/0x1790 [ 411.250136][ C1] ? add_timer+0x940/0x940 [ 411.254633][ C1] ? kvm_clock_read+0x18/0x30 [ 411.259311][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 411.264506][ C1] ? sched_clock+0x2e/0x50 [ 411.268930][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 411.273777][ C1] ? trace_hardirqs_on+0x67/0x240 [ 411.278807][ C1] __do_softirq+0x262/0x98c [ 411.283358][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 411.288199][ C1] irq_exit+0x19b/0x1e0 [ 411.292353][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 411.297892][ C1] apic_timer_interrupt+0xf/0x20 [ 411.302805][ C1] [ 411.305780][ C1] RIP: 0010:check_stack_object+0x6/0x160 [ 411.311397][ C1] Code: e8 6f f2 b8 ff 4c 89 e7 e8 07 f0 e0 ff 5b 41 5c 5d c3 e8 5d f2 b8 ff 0f 0b e8 16 2a f7 ff eb ce cc cc cc cc 55 48 89 e5 41 57 <41> 56 41 55 49 89 fd 41 54 53 48 89 f3 48 83 ec 08 e8 34 f2 b8 ff [ 411.330983][ C1] RSP: 0018:ffffc90002377d08 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 411.339470][ C1] RAX: ffff88808f8a6480 RBX: 0000000000000fe0 RCX: ffffffff81bc2fe6 [ 411.347588][ C1] RDX: 0000000000000000 RSI: 0000000000000fe0 RDI: ffff88809e52cca0 [ 411.355553][ C1] RBP: ffffc90002377d10 R08: ffff88808f8a6480 R09: 0000000000000000 [ 411.363503][ C1] R10: ffffed1013ca5b8f R11: ffff88809e52dc7f R12: ffff88809e52cca0 [ 411.371453][ C1] R13: ffff88809e52dc7f R14: ffff88809e52dc80 R15: 00000096ae7e7d1a [ 411.379425][ C1] ? __check_object_size+0x86/0x437 [ 411.384614][ C1] __check_object_size+0xa0/0x437 [ 411.389620][ C1] strncpy_from_user+0xa8/0x400 [ 411.394461][ C1] getname_flags+0x11b/0x5b0 [ 411.399037][ C1] ? security_prepare_creds+0xf5/0x190 [ 411.404500][ C1] user_path_at_empty+0x2f/0x50 [ 411.409370][ C1] do_faccessat+0x262/0x7f0 [ 411.413854][ C1] ? __ia32_sys_fallocate+0xf0/0xf0 [ 411.419033][ C1] ? handle_mm_fault+0x4ab/0xa50 [ 411.423991][ C1] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 411.430049][ C1] ? trace_hardirqs_off_caller+0x65/0x230 [ 411.435753][ C1] __x64_sys_access+0x59/0x80 [ 411.440426][ C1] do_syscall_64+0xfa/0x790 [ 411.444937][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.450820][ C1] RIP: 0033:0x7f6951813267 [ 411.455216][ C1] Code: 73 01 c3 48 8d 0d 3d af 20 00 31 d2 48 29 c2 89 11 48 83 c8 ff eb eb 90 90 90 90 90 90 90 90 90 90 90 90 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 0d af 20 00 31 d2 48 29 c2 89 [ 411.474806][ C1] RSP: 002b:00007ffc2df2def8 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 [ 411.483215][ C1] RAX: ffffffffffffffda RBX: 0000000000400f31 RCX: 00007f6951813267 [ 411.491171][ C1] RDX: 00000000000033ef RSI: 0000000000000000 RDI: 00007f69518172e6 [ 411.499124][ C1] RBP: 00007f6951a16000 R08: 0000000000000003 R09: 0000000000000000 [ 411.507075][ C1] R10: 0000000000000002 R11: 0000000000000246 R12: 00007f6951a1e1c8 [ 411.515030][ C1] R13: 00007f6951a16718 R14: 00000000000033ef R15: 00007f6951a1e570 04:19:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01704d1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa1}, 0x0) [ 411.582120][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 411.589301][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 411.653891][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 411.668047][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 411.687095][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env 04:19:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb}, 0x0) 04:19:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r4, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xac}, 0x0) [ 411.697300][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 411.712252][T16921] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 411.719452][T16921] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0170ad1bd", 0x33fe0}], 0x1b1}, 0x0) [ 411.786179][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 411.793897][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 411.812488][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 411.819645][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x404000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000140)=0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa2}, 0x0) [ 411.879200][T16947] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 411.886494][T16947] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xc}, 0x0) 04:19:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0170ed1bd", 0x33fe0}], 0x1b1}, 0x0) [ 411.937429][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 411.944680][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xad}, 0x0) [ 412.002989][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 412.010177][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 412.042296][T16946] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env 04:19:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f0170fd1bd", 0x33fe0}], 0x1b1}, 0x0) 04:19:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xd}, 0x0) [ 412.055020][T16946] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 412.082982][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 412.090157][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r3, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa3}, 0x0) 04:19:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xae}, 0x0) 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xe}, 0x0) 04:19:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x77a}, 0x10000, 0x0, 0x2, 0x0, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xc) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) [ 412.185882][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 412.207473][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:19:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01760d1bd", 0x33fe0}], 0x1b1}, 0x0) [ 412.284025][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 412.291228][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 412.302703][T16976] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 412.321824][T16976] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa4}, 0x0) 04:19:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xaf}, 0x0) [ 412.349625][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 412.380840][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xf}, 0x0) 04:19:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1b1", 0x33fe0}], 0x1b1}, 0x0) [ 412.404358][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 412.417850][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:19:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa5}, 0x0) [ 412.469456][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 412.485675][T16986] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 412.486855][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 412.501834][T16986] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x10}, 0x0) [ 412.512483][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 412.528309][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb0}, 0x0) [ 412.615032][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 412.640182][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:19:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0xf}], 0x1b1}, 0x0) 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa6}, 0x0) 04:19:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x11}, 0x0) [ 412.683046][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 412.692833][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 412.709584][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 412.717804][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb1}, 0x0) [ 412.750067][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 412.779573][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa7}, 0x0) 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x12}, 0x0) 04:19:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb2}, 0x0) 04:19:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0xec0}], 0x1b1}, 0x0) 04:19:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) [ 412.850914][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 412.867272][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000007700000000000005000000900300000000000070010000180200007001000000000000f8020000f802000800000000f80700000002000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa8}, 0x0) [ 412.931203][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x13}, 0x0) 04:19:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb3}, 0x0) [ 412.991101][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 413.030928][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env 04:19:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) [ 413.069479][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xa9}, 0x0) 04:19:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x482e}], 0x1b1}, 0x0) [ 413.120175][T17042] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 413.135999][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env 04:19:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x14}, 0x0) [ 413.171239][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 413.200700][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env 04:19:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb4}, 0x0) 04:19:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) [ 413.216832][T17048] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 413.231193][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:19:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x4830}], 0x1b1}, 0x0) 04:19:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xaa}, 0x0) [ 413.264841][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 413.296266][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:19:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140), 0x0, 0xfffffffffffffffa) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000140)={0x4, 0x2}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 04:19:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x15}, 0x0) 04:19:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) [ 413.328829][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 413.349232][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:19:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb5}, 0x0) 04:19:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x34000}], 0x1b1}, 0x0) 04:19:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xab}, 0x0) 04:19:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x16}, 0x0) [ 413.410875][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 413.442293][T17068] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 413.449345][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 413.471610][T17068] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 413.475807][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env 04:19:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xac}, 0x0) [ 413.519819][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 413.548466][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env 04:19:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x20034020}], 0x1b1}, 0x0) 04:19:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb6}, 0x0) [ 413.565455][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 413.588227][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 413.595797][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 413.608885][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env 04:19:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xad}, 0x0) [ 413.616140][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 413.628524][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 413.635881][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 413.647884][ T4259] kobject: 'loop2' (000000002e6f2e9b): kobject_uevent_env [ 413.655132][ T4259] kobject: 'loop2' (000000002e6f2e9b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 413.665507][T17062] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 413.676353][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 413.683631][T17062] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 413.693881][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 413.731096][T17068] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 413.745291][T17068] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 413.756265][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 413.774163][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 413.786014][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 413.793250][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 413.812971][ T4259] kobject: 'loop4' (00000000be31778e): kobject_uevent_env [ 413.820128][ T4259] kobject: 'loop4' (00000000be31778e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 413.831805][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 413.838986][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 413.852090][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 413.859251][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 413.870443][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 413.877633][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 413.888751][ T4259] kobject: 'loop3' (000000005b856d6e): kobject_uevent_env [ 413.895919][ T4259] kobject: 'loop3' (000000005b856d6e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 413.906992][ T4259] kobject: 'loop1' (00000000e5f5f791): kobject_uevent_env [ 413.914169][ T4259] kobject: 'loop1' (00000000e5f5f791): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 413.925502][ T4259] kobject: 'loop5' (00000000efedd6b8): kobject_uevent_env [ 413.933148][ T4259] kobject: 'loop5' (00000000efedd6b8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 413.952076][T17095] kobject: 'loop0' (0000000048de7aca): kobject_uevent_env [ 413.960299][T17095] kobject: 'loop0' (0000000048de7aca): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:19:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402, 0x0, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e3314016cda7d5481ca8b7fab2486280dd67", 0x12, 0xfffffffffffffff8) add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000140), 0xffffffffffffff92, r0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000100)=0x1) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000140)={0x1, 0x8}) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000000c0), 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000300)=0x7) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 04:19:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x17}, 0x0) 04:19:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xae}, 0x0) 04:19:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0x7ffff000}], 0x1b1}, 0x0) 04:19:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb7}, 0x0) 04:19:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xb8}, 0x0) 04:19:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r1, 0x3405de1fe36617f9, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:19:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a400c000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x18}, 0x0) 04:19:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4007000000053582c137153e370907088000f01700d1bd", 0xfffffdef}], 0x1b1}, 0x0) 04:19:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffffe8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800003000056bd25a80648c630a4008000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0xaf}, 0x0)