[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 75.155179] audit: type=1800 audit(1549760091.216:25): pid=10027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 75.174409] audit: type=1800 audit(1549760091.216:26): pid=10027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 75.193931] audit: type=1800 audit(1549760091.216:27): pid=10027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.85' (ECDSA) to the list of known hosts. 2019/02/10 00:55:03 fuzzer started 2019/02/10 00:55:08 dialing manager at 10.128.0.26:34657 2019/02/10 00:55:09 syscalls: 1 2019/02/10 00:55:09 code coverage: enabled 2019/02/10 00:55:09 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/02/10 00:55:09 extra coverage: extra coverage is not supported by the kernel 2019/02/10 00:55:09 setuid sandbox: enabled 2019/02/10 00:55:09 namespace sandbox: enabled 2019/02/10 00:55:09 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/10 00:55:09 fault injection: enabled 2019/02/10 00:55:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/10 00:55:09 net packet injection: enabled 2019/02/10 00:55:09 net device setup: enabled 00:57:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x404c534a, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) syzkaller login: [ 234.287672] IPVS: ftp: loaded support on port[0] = 21 [ 234.428449] chnl_net:caif_netlink_parms(): no params data found [ 234.494930] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.501513] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.510157] device bridge_slave_0 entered promiscuous mode [ 234.519778] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.526583] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.534834] device bridge_slave_1 entered promiscuous mode [ 234.566888] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 234.578249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.607421] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.615842] team0: Port device team_slave_0 added [ 234.622947] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 234.631197] team0: Port device team_slave_1 added [ 234.637620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.646766] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.826414] device hsr_slave_0 entered promiscuous mode [ 234.992220] device hsr_slave_1 entered promiscuous mode [ 235.143261] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 235.150800] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 235.177959] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.184604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.192222] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.198804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.281433] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 235.287724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.302460] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.317063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.327550] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.337611] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.348841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 235.367365] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 235.373677] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.388604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.397212] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.403755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.437495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.445912] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.452460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.462113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.475581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.486325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 235.502917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.511638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.525335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 235.535485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.544011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.556508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 235.566313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.578083] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 235.584358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.593631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.602360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.630110] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 235.651018] 8021q: adding VLAN 0 to HW filter on device batadv0 00:57:31 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000500)={0x0, 0x10000, 0x1000}, 0x18) 00:57:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r4, 0x0) shutdown(r4, 0x0) 00:57:32 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20008044) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 236.182165] hrtimer: interrupt took 33220 ns 00:57:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000ac0)={0x41a, 0x4d, 0x1}, 0xffffffffffffff77) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) semget(0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000002c0)={{}, {0x80}, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40505330, 0x0) 00:57:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @multicast1}], 0x2c) 00:57:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) connect(r0, &(0x7f0000000100)=@ll={0x11, 0xfe, r1, 0x1, 0x7f, 0x6, @remote}, 0x2ab) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x5, 0x8ab, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "ba0ab2987139498828fe76f382f8a43c10137c5456d1f8bafbf6f8d0c2c6b06adafb9b1bb701ce7bedfdb0c75b51a7bafe25a132fa7dee888ff25aeaf48d222a"}}, 0x80}}, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x50, 0x4) recvmmsg(r0, &(0x7f0000003240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:57:33 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) r1 = gettid() write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xffffffffffffffff, 0x6, {{0x5, 0x4, 0x2, r1}}}, 0x28) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000080)={0x3, r0}) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000000c0)) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/51) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) r2 = socket$inet6_sctp(0xa, 0x88305ea6a5e569e1, 0x84) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x0, 0x0, "39aa5d9cdc79e5b1a8d40637530a2b8fb00def6960a3d688a758166887e8850b2087815435f844b818e01af43271d66abf1ac497943a574328ae17f14c9db4ba2645c8056fa6e5b0731441fb3dd28d4b"}, 0xd8) mount(&(0x7f0000000380)=@sg0='/dev/sg0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='udf\x00', 0x240002, &(0x7f0000000440)='md5sum!security') ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xfffffffffffff800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x804400}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x100, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040000}, 0x40084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000005c0)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x7, 0x7}, &(0x7f0000000680)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000006c0)={r5, @in6={{0xa, 0x4e23, 0xfffffffffffff001, @dev={0xfe, 0x80, [], 0x23}, 0x3}}, 0x572, 0x1, 0x4, 0x10001, 0x22}, 0x98) tee(r3, r3, 0x1, 0xb) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000780)=0x1ff) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xa) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000007c0)) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/loop-control\x00', 0x200000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0xd7d6) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000840)={0x0, 0x4, 0x5b, "269ada7d0da4c8b2a5a9d47aa8d8005ff61e484c63d16be43218c3dd1c3e4171b7d8e47c1572321233d8f126dd2693208cd619226970f6e75dfc2636c780cad06cc4d62d77e8dc72c6625bbd340c6fbd02862d8440c920cff4e3e0"}, 0x63) fstat(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r7) write$FUSE_LSEEK(r0, &(0x7f0000000940)={0x18, 0x0, 0x5, {0x4}}, 0x18) creat(&(0x7f0000000980)='./file0\x00', 0x169) setxattr$system_posix_acl(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='system.posix_acl_default\x00', &(0x7f0000000a40)={{}, {0x1, 0x4}, [], {0x4, 0x1}, [{0x8, 0x4, r7}, {0x8, 0x4, r7}], {0x10, 0x4}, {0x20, 0x5}}, 0x34, 0x3) getsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) 00:57:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x5, 0x5, 0xed4, 0x7a, 0xb, 0x6, 0x85b, 0x7, 0x400, 0x400}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000040)=ANY=[@ANYRESDEC=r3]}) close(r2) close(r2) readahead(r0, 0x7, 0x8) 00:57:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="226099c6bbf96cc8a6a936c7a5772a8ba6c5ecb9e0c622c32021e3145313eca7b71b1870f3e294d0d6547e8f979c79432b9963811bea242bc6ecdcd821e7a218cd8e353a11524e5e6fec18da6ffacc3c4206f59b15d41183300f257d7d3a3f9876bc4727336478fbede77e2058"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 237.591406] IPVS: ftp: loaded support on port[0] = 21 00:57:33 executing program 0: r0 = epoll_create1(0xfffffffffffffffe) r1 = epoll_create1(0x0) close(r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)) socket$can_bcm(0x1d, 0x2, 0x2) [ 237.763070] chnl_net:caif_netlink_parms(): no params data found 00:57:33 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) splice(r3, 0x0, r1, 0x0, 0x20000000003, 0x0) [ 237.858396] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.865058] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.873201] device bridge_slave_0 entered promiscuous mode [ 237.892010] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.898503] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.906737] device bridge_slave_1 entered promiscuous mode [ 237.941345] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.957176] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:57:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x90000000, 0x400000) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000080)=0x1) ioctl(r0, 0x4, &(0x7f00000000c0)="0a5c2d0240316285717070") r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="7065726d70726f66066c651f64222f2f656dee0dff133176626f786e6574302d7573657200"], 0x25) [ 237.989322] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.997707] team0: Port device team_slave_0 added [ 238.004663] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.013046] team0: Port device team_slave_1 added [ 238.019576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.028223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 00:57:34 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) write$P9_RRENAME(r0, &(0x7f0000000240)={0x7, 0x15, 0x1}, 0x36e) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x0, @multicast2}], 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xa4, "12d43fc5d815c39f8fb3453c9285634ae40ae60c3d85fc83c9e51d1d2de5dd0f9a572b4a6cf9265b729989dc4b9afc3fc95c83a5e9910c7c4c7cd8b25c7fa83af2f01f976bca4d62923f68354176a33946f80d22a41fb3d6e90318f50fa77c8771a87aff0feae8317ba7e45cc93a8716d26d488f464fe83e53a7464318654df1c7acf40279569fefdfbc1f4590bd9e80737ded2a7b6d289851ee6fc7d540ebbe447a5b62"}, &(0x7f0000000180)=0xac) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000001c0)=r3, 0x4) [ 238.096533] device hsr_slave_0 entered promiscuous mode [ 238.152774] device hsr_slave_1 entered promiscuous mode [ 238.202990] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 238.210540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 238.233924] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.240432] bridge0: port 2(bridge_slave_1) entered forwarding state 00:57:34 executing program 0: syz_emit_ethernet(0x10e630, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaa3533aaaa02000000000086dd60b409000008000035002800020000000000ffffe0000002ff0416004300000000000000000000012b0090780009040060b680da0000000000000000000000000000ffffffffffff00000000000000000000ffffac14ffbb"], 0x0) [ 238.247519] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.254051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.354239] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 238.360494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.386902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:57:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000380)={'ip6gretap0\x00', &(0x7f0000000040)=@ethtool_ringparam={0x11, 0x0, 0x10001, 0x0, 0xf00}}) [ 238.412113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.421176] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.433119] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.452546] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 238.482317] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 238.488466] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.508237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.516585] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.523122] bridge0: port 1(bridge_slave_0) entered forwarding state 00:57:34 executing program 0: lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000017c0)={0x0, 0x9bd}, &(0x7f0000001800)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001840)=@assoc_value={r1, 0x947}, 0x8) sendto$inet6(r0, &(0x7f0000001940)="0038923116cfc44b0bcedcd0d589a91a8570206c5e65c66deead21be73de136aa7c032e72279782f8199289fbc7cad2fe510fb09916fb9a2cad26582daa681042c755d3c88cb7b9e0090865088d780782bb2264d77246a5c364f4c9943", 0x5d, 0x4000800, &(0x7f00000019c0)={0xa, 0x4e22, 0x1ff, @loopback, 0x6}, 0x1c) socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f0000000140)) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='em8>0\x80\n\xd4evW#\\m\xac~\xc2{typmG-\x00\x00\x00\xa3\x05\x97\xa7M\xd1\x91\xa9\x03\xe0\xa7\xe9qy\xc7?\xee\xae\xec\xad\x96@/,\x95\xb4&K:\x9bE\xd6\x11\x8d\x99\x8f\x14c\x850\xf7\xf0\x98\xbbH :W\xf6\x92.Y\b\xb8\x99\xc2\x9d\x87\xda\xbf\xab\xdc\xaaAi\rN\xf2\x81\x10V;L~\xd9\xdf/K\x19\x1baW\xdf\x7f.\xd0|xP\xd2\xbf\xf7\xd3\x97&\xdc\xbd\x008>\x8d\xe7\x8d\x0f\x81)\xd7\x95Wg\xc4\xf0\x92`\xa7\xd8a\xfb\x01\xe4o\xb4\xda\xca\xcd\xf2\x8dZ\x9d\xbf\xe7&\x9fA~Y\xa5\x99\xa9b\x9c0\x16B&\xa4\xc5\xcc(\xfd\xcf+_\xff\x1c\xe3N\x7fr5h\xdd@\x87\x00\xc9N\xfd_\x06\xaao\x9a@\x9d)\x19\xaa\xdd\x03\x80\xba\xc5}\x1cUf\x87o79?\xf8\x9aM\x8f\x86\xcc\vp\x11 |\xb1DF2\x91\xf4\fef\f\x93\xc1\xb4') r2 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='[\'+ppp1\x00', 0x0) keyctl$get_keyring_id(0x0, r2, 0xd07) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001600)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x7, 0x1}, &(0x7f0000000280)=0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000018c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001880)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000001900)={0xf, 0x8, 0xfa00, {r4, 0xb}}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000016c0)={r3, 0xb9e3, 0x20}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r7) write$vnet(r0, &(0x7f0000000200)={0x1, {&(0x7f0000000500)=""/225, 0xe1, &(0x7f0000000600)=""/4096, 0x3, 0x7}}, 0x68) socket$inet6_dccp(0xa, 0x6, 0x0) sendfile(r5, r0, 0x0, 0x71c) [ 238.566997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.575335] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.581867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.591219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.600336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.608961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.626886] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.638723] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 238.644930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.670650] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 238.679565] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.687800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 00:57:34 executing program 0: lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000017c0)={0x0, 0x9bd}, &(0x7f0000001800)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001840)=@assoc_value={r1, 0x947}, 0x8) sendto$inet6(r0, &(0x7f0000001940)="0038923116cfc44b0bcedcd0d589a91a8570206c5e65c66deead21be73de136aa7c032e72279782f8199289fbc7cad2fe510fb09916fb9a2cad26582daa681042c755d3c88cb7b9e0090865088d780782bb2264d77246a5c364f4c9943", 0x5d, 0x4000800, &(0x7f00000019c0)={0xa, 0x4e22, 0x1ff, @loopback, 0x6}, 0x1c) socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f0000000140)) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='em8>0\x80\n\xd4evW#\\m\xac~\xc2{typmG-\x00\x00\x00\xa3\x05\x97\xa7M\xd1\x91\xa9\x03\xe0\xa7\xe9qy\xc7?\xee\xae\xec\xad\x96@/,\x95\xb4&K:\x9bE\xd6\x11\x8d\x99\x8f\x14c\x850\xf7\xf0\x98\xbbH :W\xf6\x92.Y\b\xb8\x99\xc2\x9d\x87\xda\xbf\xab\xdc\xaaAi\rN\xf2\x81\x10V;L~\xd9\xdf/K\x19\x1baW\xdf\x7f.\xd0|xP\xd2\xbf\xf7\xd3\x97&\xdc\xbd\x008>\x8d\xe7\x8d\x0f\x81)\xd7\x95Wg\xc4\xf0\x92`\xa7\xd8a\xfb\x01\xe4o\xb4\xda\xca\xcd\xf2\x8dZ\x9d\xbf\xe7&\x9fA~Y\xa5\x99\xa9b\x9c0\x16B&\xa4\xc5\xcc(\xfd\xcf+_\xff\x1c\xe3N\x7fr5h\xdd@\x87\x00\xc9N\xfd_\x06\xaao\x9a@\x9d)\x19\xaa\xdd\x03\x80\xba\xc5}\x1cUf\x87o79?\xf8\x9aM\x8f\x86\xcc\vp\x11 |\xb1DF2\x91\xf4\fef\f\x93\xc1\xb4') r2 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='[\'+ppp1\x00', 0x0) keyctl$get_keyring_id(0x0, r2, 0xd07) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001600)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x7, 0x1}, &(0x7f0000000280)=0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000018c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001880)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000001900)={0xf, 0x8, 0xfa00, {r4, 0xb}}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000016c0)={r3, 0xb9e3, 0x20}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r7) write$vnet(r0, &(0x7f0000000200)={0x1, {&(0x7f0000000500)=""/225, 0xe1, &(0x7f0000000600)=""/4096, 0x3, 0x7}}, 0x68) socket$inet6_dccp(0xa, 0x6, 0x0) sendfile(r5, r0, 0x0, 0x71c) [ 238.711987] 8021q: adding VLAN 0 to HW filter on device batadv0 00:57:34 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x40, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x22c000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f00000000c0)) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x4, &(0x7f0000000000), 0xfffffffffffffffa) 00:57:35 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) timer_create(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 00:57:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/u\x05\x00\x00\x00') getsockopt$inet_tcp_int(r1, 0x6, 0x3f, &(0x7f00000003c0), &(0x7f0000000400)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local}, 0x20) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x35}}, 0x9, 0x80}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x3}, 0x8) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={r5, @dev={0xac, 0x14, 0x14, 0x2a}, @broadcast}, 0xc) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000000)=""/246) dup2(r4, r0) 00:57:35 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x64, 0x0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) prctl$PR_CAPBSET_DROP(0x18, 0x19) 00:57:35 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="021800001000000000000000000000000800120000000000000000000000000093be6e39498b80bc0000000000000000e000000100000000000000265bac760000000000000000000000000000000000030006000000000002002000ac14ffbb000000000000000003000500000000000200003db28dbebb0000000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xfff, 0x1) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000140)={0x1ac08d86, 0x7ff, 0x1, {0x0, @vbi={0x40, 0x3, 0x3, 0x4f565559, [0x1, 0x40], [0x4, 0xffffffffffff8000], 0x13b}}}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000100)) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000240)={0x0, @src_change}) 00:57:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/u\x05\x00\x00\x00') getsockopt$inet_tcp_int(r1, 0x6, 0x3f, &(0x7f00000003c0), &(0x7f0000000400)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local}, 0x20) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x35}}, 0x9, 0x80}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x3}, 0x8) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={r5, @dev={0xac, 0x14, 0x14, 0x2a}, @broadcast}, 0xc) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000000)=""/246) dup2(r4, r0) 00:57:35 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000023b000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x2000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x151040, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100)=0x2000, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000140)={0x7, 0x7b, 0x1}, 0x7) 00:57:35 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0201000000000000000008001300e8ff0200003b91e3d9f321f8e60000000000000006000000000000000000800000000000e0000001000000000000040000000000000000da332423d9e2bd7613a2d22f5a822800000000000000001f0000170003000600000000000216000490cf7ced800000000000abb7627f53d51f147391d1dc3e120000c04494963019196602"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:57:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x10000) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000140)={0x3, 0x3, 0x7, 0x2, 0xfffffffffffffff8}) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0x72ef) read(r0, &(0x7f0000000000)=""/165, 0xf7eb550) 00:57:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) mq_unlink(&(0x7f0000000140)='nat\x00') getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x50) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc, 0xc, &(0x7f0000000040)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000b5c0d00800000005000010650000000008"], 0x1}], 0x1, &(0x7f0000000240)}, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x40, &(0x7f0000000080), 0x0) 00:57:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = shmget$private(0x0, 0x2000, 0x540000a3, &(0x7f0000ffc000/0x2000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x2000) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000920001000000000000000000000000000000000000000000000000000000000000006c002ea71bf3e65ff6dd738374dcb8ed2fa7474fe5b69c87da03fd7beb8c6dcfdbd75f3eb4efea1aea5479b9544eaef6766a4b8e3c946e3d5d407edb6f5553cff283d633d92490a41568107ed9f336306122b09b7fe166c37eae452619d562ac6d582741fd86d45fbcc625258fcde64436a5c3724460fd1f0cf21db541c87276effd3243525c2fe258c25786779644e856a6c997be02e857d171f848000bd42bb9fc30703fd3399580435d00835aea"], 0x28}, 0x8}, 0x0) 00:57:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f2370"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:57:36 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000001480)=r1, 0x39d) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) io_setup(0x2, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x80000001, r0, &(0x7f00000001c0)="45f4eafec84e098e77c38a3a7c29f98b5f2035f2a02d57964554dd46781d80b139576257595dec8a4b812b18902569bd2ba86bb915f3cf79e5fc810e931e58495a65b70b0fd23e15c4fb13293c2f2e6881597f68d7b0fe2fe2891e9447fc378fb1ebf159a00d50de6099fd499bd25c40f56c4cf84946f47d5614b2a1484366f71e7babc8ed97240d694c45080086568593b2b6aa8c2670658806a8f0499f600fa607486bbc5d86389931ba", 0xab, 0x195, 0x0, 0x3}, &(0x7f0000000280)) [ 240.248163] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 240.295495] Dead loop on virtual device ip6_vti0, fix it urgently! [ 240.313410] Dead loop on virtual device ip6_vti0, fix it urgently! 00:57:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unshare(0x20400) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000140)={0x807f, 0x3}) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000000)=""/202) 00:57:36 executing program 0: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) rt_sigaction(0x17, &(0x7f0000000100)={0x0, {}, 0x0, 0x0}, &(0x7f00000001c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000200)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="2a7ae0d810a58900c9fcbdcf353df8c8972e9b75b763829c128406438227a321975965c6b0cc9919699f8115656895b29f360e8403765eb75dbe970a456ca2c2a48a39904c39d82aa998d63956457dbcda2df76b1828a0cdf074d711c2ae3ab3d476476c348ec5", &(0x7f00000000c0)="f08679b82d10af4547920263bcbe716804ecbe08988e0f5b4c22149bc6d6feabd10f5b84ac63702bf2c9a0d6c3b7", 0x2}, 0x20) fcntl$F_SET_RW_HINT(r0, 0x40c, 0xfffffffffffffffe) 00:57:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) set_tid_address(&(0x7f0000000280)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000180)={0x29}) 00:57:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f2b898000ba2000ecbaf80c66b88711068266efbafc0cec36660ff7d2ba4200b000ee0f38cad20f017b580f20e06635400000000f22e0670f01ca67f3ab", 0x3e}], 0x1, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:57:36 executing program 0: r0 = memfd_create(&(0x7f0000001240)=':procGPLh\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) unshare(0x4000400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f00000001c0)={r3, 0x2, &(0x7f00000000c0)=[0x80, 0x5], &(0x7f0000000100)=[0xffff, 0x3cfe5484, 0x940], 0x45, 0x1, 0xfffffffffffffff7, &(0x7f0000000140)=[0x2d2], &(0x7f0000000180)=[0xe8b, 0x8]}) r4 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, 0x0) 00:57:36 executing program 1: unshare(0x8000400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x101100) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xffffffffffffffff) 00:57:37 executing program 0: r0 = socket$inet6(0xa, 0x8000000001, 0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0xfffffffffffffffc}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @multicast1, @broadcast}, 0xc) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000000), 0x4) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2}}, {{}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) close(r3) 00:57:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101080, 0x0) connect$netlink(r2, &(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000040807031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) sendfile(r0, r0, 0x0, 0x6) 00:57:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x6, &(0x7f0000000000)=[{0xfff, 0x4, 0x1000, 0x3f}, {0x0, 0x30, 0x3ff, 0x101}, {0x8, 0x9, 0x17, 0x1000}, {0x3000000000000000, 0xff, 0x7fffffff, 0x100000001}, {0xff, 0x200, 0x2, 0x80}, {0x2, 0x101, 0x400, 0x2}]}, 0x10) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendto(r2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) sendto(r2, &(0x7f0000001640)="13", 0x1, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") [ 241.203916] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 241.233207] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 00:57:37 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x1) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x400000, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x800008000000003a, 0x0, &(0x7f0000013000)) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=@dstopts={0x3b, 0x0, [], [@padn={0x1, 0x2, [0x0, 0x0]}]}, 0x10) 00:57:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000100)='\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x800, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000200)=0x10) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_mreq(r3, 0x0, 0x20, 0xfffffffffffffffe, &(0x7f0000000100)) getpeername$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) 00:57:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x6, &(0x7f0000000000)=[{0xfff, 0x4, 0x1000, 0x3f}, {0x0, 0x30, 0x3ff, 0x101}, {0x8, 0x9, 0x17, 0x1000}, {0x3000000000000000, 0xff, 0x7fffffff, 0x100000001}, {0xff, 0x200, 0x2, 0x80}, {0x2, 0x101, 0x400, 0x2}]}, 0x10) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendto(r2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) sendto(r2, &(0x7f0000001640)="13", 0x1, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 00:57:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:57:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000180), 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000200)=0x1a, 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000040)=0x10) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) 00:57:37 executing program 0: syz_emit_ethernet(0x10198, 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='!\x00', 0xffffffffffffffff}, 0x30) tgkill(r0, r1, 0x3f) 00:57:38 executing program 1: unshare(0x8000400) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\x00') lseek(r0, 0x0, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x401) 00:57:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00d\x00\xec\xc1\x9f\x15\xba\xcdl\xffOd\x8d\x8dKOb\xcf\b\x81\xf6\xe4\x84Z\xab\xed7e}CK\x8d\xa9>\xe7') r1 = dup(r0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x4040) utimensat(r0, 0x0, 0x0, 0x100) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000100)={0x8, 0xa59c}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r1) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000000c0)=r1) 00:57:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000040)='./file0\x00', 0x2) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) creat(&(0x7f0000000000)='./file0\x00', 0x0) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x6) 00:57:38 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x3b64, 0x0) signalfd4(r0, &(0x7f0000000000)={0x8}, 0x8, 0x800) 00:57:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x10, &(0x7f0000000000)=0xffffffffffff3f42, 0x4) 00:57:38 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0af51f023c123f3188a070") ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80605414, 0x0) 00:57:38 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000080)={{0x6, 0x6, 0x6, 0x81, 'syz1\x00', 0x8000}, 0x3, 0xed96f3fbcc9e472c, 0x59, r2, 0x4, 0x101, 'syz0\x00', &(0x7f0000000040)=['\x00', '#mime_typevboxnet1^lo\x00', '/-\x00', '*.}em0\x00'], 0x21, [], [0x3, 0x10000, 0x20, 0x1]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@window={0x3, 0x7, 0x4}, @timestamp, @sack_perm, @mss={0x2, 0x3}], 0x4) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="bf74d1cbba76e2750b3ec3965115dfe3b9c849863cf1f8d5a1c985b3504b8a755abb306f3caabf9c2098a5f5bb27277cf9913fe9f3ad9e4bf6b8c9735d07add598073f18c1e0f86e378ba598ea22f2a4057de215fb7a8bdbb6c0dec7034cc7c7538a47ce0cf40bd0633ecbde0cedfb6a2cd10a51d939837ab8302effbfad51eb0f91f504c38a1d35b040ac6f0dfef9fe7461e4b671808d1f24ebe7887caaf9fccc1cbf745ea46ceae66d9ad5b548a02428f45603202f9edf2d52f027119c5371b31c786352fdf37c9e4756bf83394d48c9a5728655088ff96e780fce6360390bca0b2435875e689003d849", 0xeb, 0xfffffffffffffff8) keyctl$describe(0x6, r3, &(0x7f0000000380)=""/177, 0xb1) waitid(0x0, r2, &(0x7f0000000440), 0xa, &(0x7f00000004c0)) unshare(0x8000100) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000580)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000, 0x1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000600)) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000700)={0x7, 0x100, 0x3, 0x8}) keyctl$describe(0x6, r3, &(0x7f0000000740)=""/4096, 0x1000) getsockname$packet(r0, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) bind$xdp(r1, &(0x7f0000001b80)={0x2c, 0x4, r5, 0xc, r1}, 0x10) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000001bc0)={0x100, "93b3ca519986318d68d8b389b2745e9789a28763d9848d5e302464ddcd220dce", 0x7, 0x24, 0x101, 0x80, 0x0, 0x7, 0x7, 0x3}) lsetxattr$security_capability(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='security.capability\x00', &(0x7f0000001cc0)=@v1={0x1000000, [{0x0, 0x7}]}, 0xc, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000001d00)={{0x2f, @empty, 0x4e24, 0x3, 'rr\x00', 0x6, 0x49a5ce12, 0x57}, {@broadcast, 0x4e24, 0x10003, 0x3, 0xfffffffffffffff9, 0x1b45}}, 0x44) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000001d80)) sendto$inet(r1, &(0x7f0000001dc0)="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", 0x1000, 0x40000, &(0x7f0000002dc0)={0x2, 0x4e20, @broadcast}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000002e00)='/dev/null\x00', 0x140, 0x0) ioctl$KDDISABIO(r0, 0x4b37) timer_create(0x6, &(0x7f0000002e40)={0x0, 0x1, 0x2, @tid=r2}, &(0x7f0000002e80)=0x0) timer_gettime(r6, &(0x7f0000002ec0)) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002f40)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f00000031c0)={&(0x7f0000002f00), 0xc, &(0x7f0000003180)={&(0x7f0000002f80)={0x1e0, r7, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2a}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x131b2e2d}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa6}]}]}, @TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbcac}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32d5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9439}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffe000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x380}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x101, @rand_addr="f73fd7183cc96eac08fcb1c4777f14df", 0x80000001}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xa8c, @mcast2, 0x8d}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xff, @empty, 0x22}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @mcast1, 0x401}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4041}, 0x8090) fcntl$setownex(r1, 0xf, &(0x7f0000003200)={0x1, r2}) 00:57:38 executing program 1: 00:57:39 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xd3c8) r1 = dup3(r0, r0, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)=0x7ff) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000001540)=@routing, 0x8) 00:57:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0x0, 0x0, [0x8, 0xeab6, 0x430, 0x1]}) fcntl$setsig(r0, 0xa, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCSETS(r1, 0x800455ca, 0x0) 00:57:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0xfffffffffffffffe, 0x8004081000000038) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffdf9, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0233f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1, 0x0, 0x269}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 00:57:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xc3, &(0x7f0000000000)="0adc1f123c123f3188b070c76811218053e12e60f5ad43de4276e5bfe22d499060f2078ddb32c29c7aa65010c1537001c026212b855c3c363d49ee079ce7b5fca949f3c0e940be499d665fd2d8958c7cc1733094e120beb2f38f131e34ceaab4368a320696d391ceb79ba47489ac12efdcf154c5fd46") r1 = socket$unix(0x1, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x40000, 0x0) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x7c26, 0x40400) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x3, 0x10802) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) bind$unix(r1, &(0x7f0000000340)=@abs={0x1}, 0x21) r3 = socket$netlink(0x10, 0x3, 0x80000000004) write(r3, &(0x7f000058bfe4)="29000000140005b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) [ 243.440646] IPVS: ftp: loaded support on port[0] = 21 00:57:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000000c0)={0x3, 0x2, {0xffffffffffffffff, 0x3, 0x9, 0x3, 0xff2}}) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000080)="3fc40093", 0x4) write(r0, &(0x7f0000000140)="2200000018007c4e47d7b1ccff652186979f580700f417e512b87cba48c1cb65d145", 0x22) [ 243.643290] QAT: Invalid ioctl [ 243.649140] QAT: Invalid ioctl 00:57:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180)=0x55) [ 243.698696] chnl_net:caif_netlink_parms(): no params data found 00:57:39 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) semget$private(0x0, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0x1c0) [ 243.794176] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.801681] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.809780] device bridge_slave_0 entered promiscuous mode 00:57:39 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000540)='./file0\x00') r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="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", 0xfb, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) umount2(&(0x7f0000000380)='./file0/../file0/file0\x00', 0x4) chdir(&(0x7f0000000040)='./file0\x00') [ 243.855669] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.862315] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.870384] device bridge_slave_1 entered promiscuous mode 00:57:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2) ioctl(r0, 0xffffffffffffffbb, &(0x7f0000000200)) getpeername(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0x80) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) [ 243.974077] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.002914] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:57:40 executing program 1: r0 = memfd_create(&(0x7f0000000240)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00J\x84{\xa4\xde\xd8\v@\xaa\x03o\x9f\x84\xa4~\x85\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9?\x1a)\x16\x02R\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xb8\x01\xf2\xcdr\xb8(\x98\xd4bi7\bj\v\xefG0b\xd8C\xefA\x016\x9d\xdaDv\xf1%\x84\xf9\xce\x82D8\xe5v\xd9\x97\xc2\xfe\"\x8f\xef\x89\xd6\xcc\xd2\xa5f\xc0i\x84\xd7\x91\xa2\xe1c\xa9\xfa\xa8\x85\xa15\xbd\xe1x\x87\rL\xd2c\x8151\xde:\x1e\'N\xf5\xbb\xe5.\xb6\xbd\x14+/\rE\x86\x96\n=\xd8\xa4\xdcm\xb3DMl\xbb\a\xbc\x13H\xf5\t\x9b\xcf\xd2,\xd3\xa5\xac\xba=a{\x9b\xfe\x89\x01:\x90]\xfaC\'tu!\xe49\xeb\x1b??`IR\xf9T\x1e>x\xf1\xa0\xd9\x98\x92# \vy\x98\x86\t\x96\x15\x94i\x12\x00\xccM\x99.\xc3\x1e\fH\xb3G/k[\xef\x9en_)\xa1\x14&\xd2yf\x8b\xda\xc7&\xdbI\a\x89\xceB\x1fC\xdf\xae\x00\xba\x185T&\x8eBv\xec\x81\x02', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) syz_open_dev$sndmidi(&(0x7f0000653fee)='/dev/snd/midiC#D#\x00', 0x200, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x100) [ 244.046941] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.055318] team0: Port device team_slave_0 added [ 244.073594] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.082072] team0: Port device team_slave_1 added [ 244.089758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.114591] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.236826] device hsr_slave_0 entered promiscuous mode [ 244.292917] device hsr_slave_1 entered promiscuous mode [ 244.332871] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 244.340334] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 244.366516] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.373084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.380117] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.386692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.461415] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 244.467675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.482063] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.498567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.509472] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.519913] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.530183] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 244.549730] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 244.555985] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.570518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.579121] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.585679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.625170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.634244] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.640700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.650231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.659410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.684046] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 244.693886] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 244.705391] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 244.716336] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 244.724578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.733425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.755756] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 244.762385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 244.789544] 8021q: adding VLAN 0 to HW filter on device batadv0 00:57:41 executing program 2: syz_open_dev$sndmidi(&(0x7f0000000380)='/dev/snd/midiC#D#\x00', 0x2, 0x1) 00:57:41 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4080, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x426fbca4, 0x0, 0x1, 0x4}, 0x10) unshare(0x20400) r1 = socket$netlink(0x10, 0x3, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x101200, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x72, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e23, 0x7f, @empty, 0x2}}, 0x80, 0x8, 0x2, 0x4, 0x20}, &(0x7f0000000240)=0x98) getsockopt$netlink(r1, 0x10e, 0xb, &(0x7f0000000040)=""/8, &(0x7f0000000000)=0xfffffffffffffee0) 00:57:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x800) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_misc(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="772c0c534855e01ed7766b19b5b6b82fc91ab2b11d447b392f0ce374afddbc0acc37b9b61eb3055f4a"], 0x1) getpid() recvmsg(r3, &(0x7f0000000040)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/2, 0x2}], 0x1, 0x0, 0xfffffffffffffd6f}, 0x0) 00:57:41 executing program 0: setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000780)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC], @ANYRES64, @ANYRES64, @ANYRESDEC]], 0x1) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000340), 0x584, 0xfffffffffffffffd) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 00:57:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000cd8ff4)) r2 = accept(r1, &(0x7f0000000080)=@pppoe, &(0x7f0000000000)=0x80) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) listen(r0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x30}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000280)={r3, 0x5, 0x30, 0x800, 0x9}, &(0x7f00000002c0)=0x18) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 00:57:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x301000) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000000000), &(0x7f0000000080)=0x4) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f0000000280)='./file0\x00', 0x8000, 0x4) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000001c0)={@remote, @local, @local}, 0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) poll(&(0x7f0000000040)=[{r3}], 0x20000000000000e6, 0x0) 00:57:41 executing program 2: unshare(0x20400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000000c0)={0x2, 0x100}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000040)) 00:57:41 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x4, 0x0) r1 = getpid() r2 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x3, 0x20800) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000340)) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x100000001, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0xcd, 0x6, 0x0, 0x3, 0x0, 0x9, 0x5, 0x1f, 0x1, 0x9, 0x4, 0x5, 0xffffffffffffffe1, 0x1000, 0x8d, 0x1ff, 0x4, 0x7fff, 0x2, 0x1, 0x0, 0x75e, 0x0, 0xa85, 0xd788, 0x1, 0x536, 0x3, 0x7fffffff, 0x8, 0x1, 0x80000000, 0x7, 0x5, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0x4}, 0x20008, 0xffff, 0x1000, 0x5, 0x4be9, 0xa39, 0x47a8}, r1, 0xd, r3, 0xb) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x0, 0x8000, 0x2000000000000002, {0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x15182c}}}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000280)) setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "af9e5ac704ac95ccda0a68902167a61b7154e8bc"}, 0x15, 0x1) 00:57:41 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2d, 0xa, 0x0, "37ff000000000011c85a0f010000000000000000000400"}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000140)) 00:57:41 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x4) close(r0) r2 = semget$private(0x0, 0x7, 0x10) semctl$GETZCNT(r2, 0x2, 0xf, &(0x7f00000000c0)=""/175) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) semctl$GETZCNT(r2, 0x3, 0xf, &(0x7f0000000180)=""/218) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_pwait(r1, &(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) 00:57:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="0a5d1f023c126285719070") r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x200400, 0xd, 0x1, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000240)=0x3) 00:57:41 executing program 0: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000480)="93cd808000006969ef69dc00d98adcd0d00fd1b0adb5d9000000303053fb0fc4e3fbf03a0fe39aa95ff965be3c3b4d4d408064797f419fdf400ec4e1fd2888a0000000ff2a9d67450f483bc4617f111fc4c2b93ab2001000020fc476c1610f2cfbd5d578860404a9b9b9b1d9cd8f0f0000c4e2193ec79f") mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 00:57:41 executing program 2: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000040)="e0eb795e333d10ccdf6b0eec468f678a78503bef0ac3c99b8554bdb945888251af95596792d16421855d55e79d348681af5857c71c59bef061dacc8dc03c32d28a91ba62523094e2d9334c560c3ad15cafe965d064845d910d23791e717fc8e85e1b880e4fffd3441022cdc6526ca0c4b5a3727806c781a702249f0753e7af878a1aebdbbaf2a70f954f78613870fc482c7d250b7988459a23830c861584df17d1d6b21fe722854e97a133d430b1866b8f3cb9df111b4710542756013644cde33d6b732ee69a11625ea56baaa80e559022fa48626097e428e9885f764febcb1d3908635eda7b046fc59cb83d29fd5ac62e8f25048787a2"}, {&(0x7f00000001c0)="16f895dcd80529ed0385f443bd6bb5af0b9d60d8d80b2b9735ecd0f08ad9c03733e426a47d3339ddce8eb64e1fd49cec5709a14a80c129c7d123d53fda60d24ad5d5fc7ca068aae2d67d63716b67ccbab586d557d2a37fb8b5a7625fc582251b38027ea5e1c468738fd257512a8f31521e195c196fcaf77c9944d81c92ecd3b897304e100337f8669ffc878bbbbd2a6ce138bb928974cc20de5ef2d97abc970694e2d39fe779497c0b4db06a2d63c1617eb2a856d9e9a4867cb87a3720790fb0e142552af4877d30d545d2adac9506e1840be0b12177ebf14d23eb3a0dddc076a754a9ef9169e7364a8766"}, {&(0x7f00000002c0)="323552eb1ca5ca99007068aedc5ab4423d89e7b161acbb3bf4aa55beee7e13a3d0929e67c1f341f3e98db0d55d75a63bfa84bd0d4deb1f822977d831f2ed349a4f20428a712fa004c57d0f090e5e44723818c6208ed79f65b733fca4542bea06c6a54e12ab5d1a9d04bd1872978dd7d856d67830c4604fb28ef817e8e4722ca5ed33077f92e62f5a15a3629a9521ecb0e4ef0b64a2de6b1e5f50e42c153c3d184a289f3565d591b390502ebb56467c1d98f7f9a174ee6514058682308e87bc53efe35da11ca4fb9762af4c6fd20efb3b863b7ff032703f37052d94cbb84e7c309cdc7733"}, {&(0x7f00000006c0)="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"}, {&(0x7f00000004c0)="0bf281a3c0fc9d2c8ea554dc09a13b36b49e716ce74a3a4fe8340cc544b22de610c9ec3068c912801b9adea46b7c0305cb7135bfe1904fe1a9c11bab7fad1e813af25af22e3d0f51a2e6f164bf4ae56121ed6c0987f1dbb8fcc5b4b442586f957b4ef35c"}, {&(0x7f0000000540)="96494f337486cd06c26fac80a6d17d4c977b88bad755ac0c6377c6fa402ee5bb4853769bb3373fd64c4a74d8b84439550b94f6a2b79cd9249278499c26024099bd1c904460d730774cd03adda1815c8ff311466fc1c3281f96f122f6d7d50c099b0d1fab895dc414dfe646ed41772d272ea1625b86854e8758c7e2d6c8e555f663b6b032aaf9cca342f9add8651f049a041f4f7e423048f920dce4a41256bcfaf71576a778c276587f086d8d17c5acac811b9a09f6ba74bf9b8798ca87a825628478886a729ad565bd373f"}], 0x10000000000001af) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) [ 245.804138] ion_buffer_destroy: buffer still mapped in the kernel 00:57:41 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='\r\x00\x1c%\x16$\xea\xe6\a\xc9\xbb\xf0\xddBN+\xe9%\x19\xe8Vr%\xb4;{\xc0GS\x85\xc78Dx\x82\x1c\x00\x00\x00\x00\xa3\x82s{q\x94\x81\x16#\x0fs\xc3FIw\x14\xe1R\xf5\x1cQ|\x06\b\xae\x9c%\xd4\x7f\xb0LV\x86\xda\xf7\xb9\xba\x81\xb5\tOef8\xf0L>\xad\'-@f&\xc9\xf4\xf9\xe2E\an\x7f\x9f76\x03\x8cj\b\xea\x02\xdcR\xe1\xd9\x89\x9d\xbc3\\\xdav\x8e\x8373\x91\b\xed#\xea\xe3\x9b\x05\xce)\xc6\xe3\xc6R\a_U') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000100)={0x2000}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x64080, 0x0) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) unlinkat(r3, &(0x7f0000000080)='./file0\x00', 0x1000000200) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0x14, 0x0, 0xb, 0x219}, 0x14}}, 0x0) [ 245.867653] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) 00:57:42 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x100, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x2080, 0x4) r4 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x3f, 0x0) r5 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000600)=0xfec3) r7 = getgid() sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)="5367abe2aa37b9e04f73b22a22299e56073be1fddfc4103536890022a06f92540aaca1383d16d7171362725592c9c3ea4f1f1bd693a308c6430acdfb952789fdca3becfee82d9c0fa5e5cbabb847fb10c80879739e559455fd346be34c9af5a581ff31a7505e0d4aa0eb345fc4fc2729f1b31825ecbdf6701f832b32a1cb5c", 0x7f}, {&(0x7f0000000140)="1418013670a2e262020b8aa469337ea3e656e7609df6e895e17b75aba950cc2cc2aeee5394b795c6d2256843598ffc7884b56c51a5a9e16727de3bea4a0ca369d555ecb0ff32b465db98a0898b3fb6f6c3b701909cbbc5d7507cffa3f4ead6ac199bcd07a1b3d088a2c3388c6da8ec76d6211de91b190ca8fd6af1b7a0294b0d7738147e9344914169cc89ee134895c90e23a4209038e8bd01caefcfd62072a145d8b85484abbccf5487cbc5d217cd921613d3137c944e53e8b5cd76b06e61655c6e686333115291ac9141330cc8c2d19e244e63721e402c47f8ace2c1919deadf9d489cd77fe4b3ec8f3b50bc6d39f4f895518160a7cfc515", 0xf9}, {&(0x7f0000000240)="31ac6523db3f29ad358f095b37c26cbdecd5c1306194958fa163139bec0cf749ca8cbb8d82f205dc3be4f5c15a89", 0x2e}, {&(0x7f0000000280)="e3cdbf3ac84da37831f797764881faebbd75adde74a41a017c536d3875ee944bba66e41560b92b1b9b3a7fc19a478cb4", 0x30}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="fdffffff"], 0x40, 0x40}, 0x4000) r8 = socket(0x22, 0x2, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000500)={0x0, 0x8, 0x4, 0x170}, &(0x7f00000005c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r8, 0x84, 0x7c, &(0x7f0000000640)={r9, 0x8, 0x100000001}, 0x8) 00:57:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {}, 0x4, 0x1}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000002, 0x32, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000180)) 00:57:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000002009) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x123, 0x100001, 0x0, 0x0, 0x400000}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x288, 0xe8, 0x0, 0xe8, 0x0, 0x0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xc8, 0xe8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7fff, 0x2e8}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0xbf5, 0x401}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) 00:57:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x10000000009e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)=0x9) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket(0x400000000010, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000018002551075c0165ff0ffc02020a000000100f0507e1000c08000b0000000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb7904", 0xe0) 00:57:42 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nfsfs\x00') write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'vmnet1]\xe2$wlan0mime_type^eth1#!'}, {0x20, 'net/nfsfs\x00'}, {0x20, ']\xbe,.,selinux'}, {0x20, '\xa2bdevHwlan1.ppp0Pnodev'}, {0x20, 'net/nfsfs\x00'}, {0x20, 'net/nfsfs\x00'}, {0x20, 'proc'}], 0xa, "959d41080bd88e7da65d3b1ea73dba2904d2de422b853e9a6a540e6e062d1adc4a0995f39b7de6e9900a474644d85389e5666f612a6595edf48e027f3451a268c929b580f614599a37245f77d2a08f3bf41103553f9da5d9d4ca9e413cc0d734ca2b6079e2cc881e984bf29d876079aa1f50cc1c1d6658ea2b4d6adf4c42"}, 0xf2) statx(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0, 0x0) 00:57:42 executing program 2: prctl$PR_GET_SECUREBITS(0x1b) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000940)={&(0x7f0000000900)='\x00'}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$P9_RXATTRWALK(r0, &(0x7f00000000c0)={0xf, 0x1f, 0x2, 0x8001}, 0xf) 00:57:42 executing program 1: unshare(0x20040600) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x40) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000240), 0x4) 00:57:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) kcmp(r1, r2, 0x5, r0, r0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000040)={0x2000000000005, @raw_data="71ec5a74b37cc1aa00995c214b4bbdc1e37e15316e3f25d55ac7fdc7453f9a5ba18cd563253adb96321c445d9f39e53044945878039086267d7e31bdeb16c488baecbaef1a37b2ae897dbff6dad98034517e7d962d9820bc6a43e3f06cbc1ae8dfde483692e134e09379e60ba1c4966dc0c7edb3bb3059113a07bc6e36edb6a7604095ab6b2ef3e2d64370924f61bec9c59ce98ce4c88f291c5b879852cdb44aa4803978d454051765d3cdef67a3b18d2f1f94b576a190e75bff5a1295607434a228eace9f7c7964"}) 00:57:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x3, 0x80, {0xa, 0x4e22, 0xc9f, @mcast1, 0x8}}}, 0xfffffffffffffcc2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) recvmsg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=""/4096, 0x1000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0x4) sendmmsg(r1, &(0x7f0000000000), 0x400000000000195, 0x0) 00:57:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x32bcf812, 0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYRES32=r3, @ANYBLOB="a70000001ad3ce24132bb355edec3df92d85f1f6e2d3cbfbf93fbfde5175653334a28f2d23fac193f0af9ba7121dd31240dfa5fb0cfff8db5fda80f7200afbbbb02fece0c46bd2042b0253e432f4885fd204000000c1e18f9f76ef9cd3b0c0fdaa509cb918f87e545323e8514060cd1bbb247e78eecc4994491d75b20a9de87713361c6b71f5e7c34160b9e9def8ce5a5c181cc9af5b014adee4fa57eb6658164c14bab259a5537e1dea1d"], &(0x7f0000000300)=0xaf) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000080)=0x20000000000002) setsockopt$inet6_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000000)=0x100000001, 0x4) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) write$P9_RSTATu(r6, &(0x7f0000000480)=ANY=[@ANYBLOB="910000007d010000006f0000000500000020040000000800000000000000000004040507000053e8000000000000000000002b00ea402d76626f786e65743073656375726974799973797374656d2f287070703070707030152370726f63000d002f6465762f6e65742f74756e000200234d0200292a0d002f6465772f6e65742f74756e00", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9], 0x91) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) close(r5) ioctl$RTC_UIE_ON(r0, 0x7003) 00:57:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x20400, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000380)={0xf, @pix={0x2, 0xda, 0x67747a5d, 0x3, 0x0, 0x1, 0xb, 0x7fff, 0x1, 0x6, 0x2, 0x2}}) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)=r3) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) close(r2) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) openat$cgroup_procs(r4, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x8ac4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000002c0)={r5, 0x10001}, 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x8, &(0x7f0000000480)=[{0xf8, 0x0, 0xff, 0x1}, {0x0, 0x100000001, 0x23d5, 0xffffffffffff8001}, {0xf3a, 0x400, 0x1891ec4c, 0x6}, {0x4, 0x1f, 0x2, 0x40}, {0x1000, 0x80000000, 0x200, 0xd4}, {0x2, 0x8000, 0x81, 0x6}, {0x7fffffff, 0x5, 0xfffffffffffffffd, 0x1000}, {0x800, 0xdb0d}]}) name_to_handle_at(r4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x5e, 0x100, "e9e79867b2b7c76d06b50c3eb3cfc2f180d8ef7dd0efadb262ffad9657c0c4f4f6c307dc519d79e92d7614ff849cddd30250345c3d320a8c82140ba243a04fe1e88a2e1a34946baf9df6b37ebb533f9010bc3bcd0c75"}, &(0x7f0000000180), 0x1400) 00:57:42 executing program 2: r0 = socket$inet(0x2, 0x200000080b, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000480)=0x74, 0xfd08) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c"], 0x1) write(r0, &(0x7f00000004c0)="6f9177aea460dc5fccd1cb3f0010829530519f75329a36facacf5df7484cf4ed52eb54afd1de75832799835bcd33fb4b1412736776ac79719f76ff736fc7f6285ad82c5e40530c79c9cf6cf4d39de2e1d6105dce55af6939793521776952f80c0851f5bab0c33adc419b0ac80477bf79f9c53a715615e1faa682274c938a7723117344ccd4579e5130cd4db13c0e0ef3ead90f9b5c8a9484484e96aa4c971dfa43a2dbd48e9d3b64f3bfeb9949240b9bc1d46a27d3ef9bd914a133e6221b4d122b6ef3650ef7c7cbef", 0xc9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) sendto$inet(r0, &(0x7f0000000380)="0f61659b5c000275afdad8a2676904ddb7348734426fd13d9e6e6fb38daf44cb9fb10f0cce0fd6814ccb28bb28a752bc0dba262e5d5049b0c13d9e7ebec3d98b024286af604f9f24dde021b22d5c27bc0d6bf86f2decce6d716681ee20aec822ce5991657e4a1716", 0x68, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000005c0)="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", 0x590, 0x0, 0x0, 0x0) 00:57:43 executing program 1: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101002) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000100)={0x28}, 0x28) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000802}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\"\x00', @ANYRES16=r1, @ANYBLOB="00062abd7000fbdbdf250e0000000c0002000800040002000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) unshare(0x40600) ioctl$int_out(r0, 0x2, &(0x7f0000000280)) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000180), &(0x7f0000000200), 0x8) 00:57:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180)=0x55) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) 00:57:43 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000)) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xa03, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x9) 00:57:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x40008000000000, 0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000100)={0xe0, {{0x2, 0x4e24, @multicast1}}}, 0x88) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000000c0)={0x1fd, 0x0, &(0x7f0000fee000/0x2000)=nil}) 00:57:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) getegid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000280)=0xcb) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r3, 0x7fff}, 0x8) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000001c0)) r4 = dup2(r0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x80, 0x1f, 0x11, 0x0, 0x0, 0x2, 0x100, 0x4, 0x7, 0x0, 0x1ff, 0x5, 0x0, 0x101, 0x5, 0x1ff, 0x0, 0x780cf4ee, 0x4, 0x8000, 0x80000000, 0xc748, 0x1, 0xffff, 0x400, 0x7, 0x3ff, 0x2, 0xa18, 0x4, 0x5e, 0x2, 0x200, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x9, 0xd, 0x2, 0x8, 0x3, 0xffffffff}, 0x0, 0x2, r4, 0x2) 00:57:43 executing program 1: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12d) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x4e22, 0x3, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="290feb7e1b2889250ac15de24cd82b88", 0x4}, 0x20, [0x0, 0x10000000ffffffff, 0x3, 0x0, 0x1, 0x7, 0x4]}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f0000000040)=0xfffffffffffffffe, 0xfffffffffffffcb3) 00:57:43 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) accept$inet6(r0, 0x0, &(0x7f0000000340)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000240)={0xa0, 0x0, 0x3, {{0x3, 0x2, 0x6, 0x7, 0x4, 0x1, {0x0, 0xff, 0x9, 0xc90, 0xfffffffeffffffff, 0x5, 0x80000001, 0x8, 0x5, 0x41c1ac91, 0x100, r2, r3, 0x1, 0x2}}}}, 0xa0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 00:57:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000401fea)='net/ip_tables_targets\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, 0x0, 0xffffffff) sendmsg$kcm(r1, &(0x7f0000002540)={&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000080), 0x2f9, &(0x7f0000000080)}, 0x0) 00:57:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:57:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300020c000000000000ebff0700080000008f00000000009682615bdc49f99dbde90000030006000000000002000000e0000100000023000000000000002800030005000004000000000000000000000000000000000000000000"], 0x60}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000003c0)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000580)={0xc4, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="07630440000000000b6300000b63000000634040030000000000000001000000000000000000000001000000000000000000000068000000000000001000000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000001000000000000000d00000000000000852a687700010000", @ANYRES64=r2, @ANYBLOB="0200000000000000852a747000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="54e100ce79640b6351d7aecbf08ef1354aa6608971748b5ed016e6e2710f29dadc0792a7f4c6cb677e340d4b0f22c14a02b028c4ca05f69cb4897ff8d41896d02f4a768b1922e937af51ef67348849f10b7586d79657a9f9ffc1345566b4afa137cf72ad1610dea89cc13c8097264b68a84f54cd4493e869a3e4916cb7fa78bdda3ee9ff4a86830df839c83d28d17bf5f44c0210e2267b56883cb076fb482a01000080e55865f0bf96fc4749c108d0f55459fcef315e956caaa01e2893b62c85f9763146cd8fae3001fcbac0306d0dfdcba65f411eae13eb5a346b"], @ANYBLOB="010000000000000003000000000000002a00000000000000"], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="30000000000000001800000000000000"], @ANYBLOB="10630840030000000000000012634840010000000000000002000000000000000000000011000000000000000000000038000000000000001000000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="8561646600000000000000000000000003000000000000001d00000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000100000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='p\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="010000000000000003630840", @ANYRES64=r3, @ANYBLOB="06630440020000000b630000"], 0x4a, 0x0, &(0x7f0000000500)="c0ab47de0801f8c3c4bd73c24a2080a9968835eb6a3aecacc3efad881b35157f97dad54fba32be4b200551142f2bae1214e17bcd20d11e67563256aad685e2fe063648a44e4560bf5b8a"}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)={0x2, 0x0, [{0x4, 0x61, &(0x7f0000000040)=""/97}, {0x3004, 0x66, &(0x7f0000000740)=""/102}]}) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000200)={0x0, 0x8, 0x80000000, [], &(0x7f0000000240)=0x7}) 00:57:44 executing program 2: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/118) semget(0x1, 0x7, 0x400) 00:57:44 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'erg\xc7\x1a\xc9w\xea\xd9\xc3\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x50) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) 00:57:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x80803, 0x2f) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x9, 0x12) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x80000002}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) connect$inet6(r1, &(0x7f00000000c0), 0x1c) 00:57:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x101) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x1, 0x4) [ 248.167075] sock: sock_set_timeout: `syz-executor.1' (pid 10620) tries to set negative timeout [ 248.197922] sock: sock_set_timeout: `syz-executor.1' (pid 10623) tries to set negative timeout 00:57:44 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xffffffffffffff6b) r0 = socket$inet(0x2, 0x3, 0x19) setxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa0800450000e000b318537f554c71f80014a88be6589f336a122d37d2ea235f0c86c2f341c1d369b47f9ca910f6214018fcb9b47074e19e39a4b3b62e714c5d4107ed8ad6ee5eed044db7ec4f91e3ed00f6bc1b68d18955986ba028ca340fa297bbb2db418fe7945f28047dc3a59d0ad79a9d8a2f2dfdba44592bd7421ca604f363e515ca52001dcb84c39e41aabd73110cd6dc8946fc248e451693d1e724344e4ec3680be56e7861c5287a8d3eba920225c68e737efab248114316a20c9ffb46833f655a31b872e5a2e8fc7e667bd7cea7b6bef0ec25bc47d627f2743b"], 0x0) 00:57:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x80000000}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000440)={r3, 0x7, 0x39, 0x3e3, 0x5, 0x9}, &(0x7f0000000480)=0x14) write$P9_RAUTH(r2, &(0x7f0000000180)={0x14, 0x67, 0x1, {0x8, 0x4, 0x8}}, 0x14) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[d::d:4640:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x200000, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x250800, 0x0) fchdir(r4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ptrace$getenv(0x4201, r5, 0x9, &(0x7f0000000240)) 00:57:44 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/78) chdir(&(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="160000006f0109000000000000000200000000000000"], 0x16) 00:57:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, &(0x7f0000000180)=0x2c4) 00:57:44 executing program 1: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback, 0x8000}, {0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x15}, 0x3}, 0xffffffffffffffff, 0x4}}, 0x48) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev}, r2}}, 0x48) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x111300, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x0, &(0x7f0000000180)=""/17, &(0x7f00000001c0)=0x11) 00:57:44 executing program 0: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x59c, 0x2080) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm-control\x00', 0x2000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/audio\x00', 0x40, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000700)='/dev/rtc#\x00', 0x8, 0x1) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x80, 0x123) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='memory.current\x00', 0x0, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f00000007c0)='/dev/snd/pcmC#D#c\x00', 0x81, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='io.stat\x00', 0x0, 0x0) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/mixer\x00', 0x4800, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r10 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r11 = timerfd_create(0x0, 0x80000) r12 = socket$rds(0x15, 0x5, 0x0) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) r14 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/vga_arbiter\x00', 0x410080, 0x0) r15 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000bc0)='/proc/capi/capi20\x00', 0x101001, 0x0) r16 = syz_open_dev$media(&(0x7f0000000c00)='/dev/media#\x00', 0x8, 0x8000) sendmsg$netlink(r1, &(0x7f0000000d00)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)=[{&(0x7f0000000900)=ANY=[@ANYBLOB="24010000120012002cbd7000fcdbdf251001280004005400baf1dbc9484bbb5323b137323c41425a510291a8a07bafe2a5ba1e86bc4456188158cdffe96445f87f3f7bbcf990abb194fd7e09ba5d18951d69a4a72809f1e737c3d976ecec1db492944b94152401c3580750792ad7778cc128e530004565f50f99509b1033b7678f4f9457bbcfaed5f8359619b776bce962dd46a61174c5fbf2bedd1d01465a6924427466c1a6a8e2a488510c7fe6ff1d9bc905d906b3b07738f365f5173d72d5d5651acc55a4ce91c4654f64238efbceb35b9fa794b56973251c1fb74ab854648bd5ed741fd799464959051850dc650e042cb91940605f62bdd36a791038ff150fe21c119e0553500c9f5604ee00278b8ace30cc039c62e7e4ec7a2d6fd10e4e2505f2000083780000"], 0x124}, {&(0x7f0000000280)={0x428, 0x25, 0x8, 0x70bd28, 0x25dfdbfd, "", [@nested={0x2d8, 0x31, [@typed={0x8, 0x27, @str='[\x00'}, @generic="23f80bda93623b053f16f5b68eda72988c9f45e35aeae920c761732b1ebd606e0bb1d69dbbd5a46df964f6661ddf6c4558edbe0f6d80afa6b75b7c16f57857a24a31110975006761643d821574267c512e5740edb0816fc37eb16a242a18bd3ff9e7f020be516d150cd3b49a327fc3c6c2764b92a8045b35908b2b73", @generic="3770deccabb3c9503bb972dc46da9f07f0b4ddd3a48221740dbff78ad06df904d3819d49e49e521a4be180e902d94ab61fa2f402f0a905a1693636caf76a1b5c30501c7cb3b8854cd456ce25bdca1ba00c366ab594e7cbe0395b3aa8f8ed102bdddf2d2cd6a9371e4255e0359d067f287b97521a4cb7471221bfd251fc4e2d7e3b59582dbd9307eb534fad9ad03f87e7dcb97cc8b8d14d8ee0f34bd1e7915722be54e0c3f71a8ca8ca7503a3b68570bff216ab2c8580608fc2f4b6a84d7f9e373a4442520308edbf2b", @typed={0x8, 0x8d, @binary="8e2a9f93"}, @typed={0x14, 0x5b, @ipv6=@loopback}, @generic="445ea14316ba5794d66ce782200db824bf67ac807a52450c181990", @typed={0xc0, 0x29, @binary="c3c4df1f822f4a3f9e2fa575e6632985399d96b982574e6403e373bbf0a6c87bde31026bf19114a183ba80bbe5aea32c21fe92f722f63e40ce5c15cad755c4d1f60e04c78e5db98080bf4beb300f582de089bf414bd9e9d3eac58acf4169d53f0011f480f152f2297cba453b310363515fa3b543f37070f839b397682a2ed359b12712225e9ca4316d3b80e3b88cc3d3eeefb2947ebdbab556aec8caedbec4f8ece276c435798c4afec03cb9e11f8205343b7870e6f69a82f2f1cc49"}, @typed={0x8, 0x38, @str='\x00'}, @generic="e8724425ca457843bc8f62db0699ceb7df228cdb99a823ff43", @generic="4476f50efe9e488b64dd1bcbbff42948f12bbe8ec17b3d50ed73b73c7335f9fd967157946b34675283731f41f515fa86ec89cf41afeae6ca8bea7720ab2da9d4a0935b23606b72158cfa8f9c26960a4e539a6baba179361bb938f4b32c2aa2b9050344a7a772dbb1f962823978421e"]}, @generic="5e8cf69ef95f93e65365051beae1d988c8982f5162dee2fff79bc5eeea56c6aa19032ad9841eae33df8db81d3e27909b2db587112fd03d8fe7f10a8c7af8d58289b8349c3dd8972abd156f5e9a5dc6ebc1645cb2b89efd53268a6fb146a569292cec1362183dc55b15701576651e1619450c1801bbeee3063ae08bad75563e54e5bcd77c7a30781af21214fb174ab8c016966fb16f1bbb8cf4f4e6d52d712d9956b905192bf155d9e1be824564e93a07d7eb1441dbcc13e1295f89f3d43137dbb3a9977421267de7240b69be9f705c988e5e6b4e7e50d79578bf94a8d9932a68ae9f8202af88cfe48e66080e182a5b0cbe", @generic="f9b06efe450dcdbd7bba22db5f0b8e4a4f9875be41a1bca78d5dc42096d37259c87f99307d0ce85d6a4fe4bdfb8389d51adebc1401628c57028cd9812ad4e8d87db13fadc5d7afae5b7ef5edb0"]}, 0x428}], 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r16, @ANYBLOB='Tj\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x88, 0x4040000}, 0x40000) ptrace(0x10, r0) ptrace(0x10, r0) tkill(r0, 0x20000000000010) 00:57:44 executing program 2: io_setup(0x1, &(0x7f00000002c0)=0x0) r1 = socket(0x2, 0x803, 0xff) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000080)={@ipv4, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, 0x100000000, 0x40, 0x75, 0x500, 0x2, 0x1030000, r2}) setsockopt$inet_opts(r1, 0x0, 0x4, 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 00:57:44 executing program 1: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000480)="78d70bdc4fe5460a1a99e77b3349099689daab46dd8e1e2eb0a3c5cc619deda49c8a75c854acd923146e62f586eb64695ca01abc162cce8504a2d02a8c7fbfb2dabdf84801fe2ea98bb377bff86c1281c3a055ebbaf26622e4a7a9d6d87a105fcdb21224854ae40eba9d1ea7241afb110a3f33b8a72e2086aa21483ce9a0a1d8819489e195f3b2a8989ee7a9530c962ec1774f625bc90f94935ea1281a361a5a77", 0xa1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x95, 0x2200) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000000c0)=r3) keyctl$dh_compute(0x17, &(0x7f0000000680)={r0, r1, r0}, &(0x7f0000000600)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f00000006c0)={'rmd160\x00'}}) 00:57:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200080, 0x40) ioctl$void(r0, 0x5451) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0xbd, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)=""/189}, &(0x7f00000001c0)=0x78) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000200)=0x6) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000240)={0x100, 0x3, 0x0, "ef2d088f07eeb3d370e617083a66a7018c5210e3176ac12891598493ff5cb17042899fc54e06b2aa8aaa9cbebefac8201d3b9efa55306e80c83010a8", 0x1b, "524291123070d3846c1fbe302516d60e7db93ae7a2be80eb7ae914837b08dfd6fcd9102f769d70bf842b2d55cb0112d22ac2f740b65298408529179d", 0xa0}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000300)='broute\x00') ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000340)=0x8) utime(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x3d04}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0x5, 0x0, [], [{0x6, 0x9, 0x3c, 0x7, 0x800, 0x2}, {0x7ff, 0x80, 0x1ff, 0xfffffffffffffffa, 0x2, 0x200}], [[], [], [], [], []]}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@filter={'filter\x00', 0xe, 0x4, 0x3c0, 0x240, 0x148, 0x148, 0x148, 0x0, 0x328, 0x328, 0x328, 0x328, 0x328, 0x4, &(0x7f0000000600), {[{{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x27}, 0xff, 0xff, 'ip_vti0\x00', 'team_slave_1\x00', {0xff}, {0xff}, 0x29, 0x3, 0x1}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0xb7, 0x4, 0x0, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x7, 0x6, 0x0, 0x57b, 0x0, 0x4], 0x100000001, 0x9}, {0x8, [0x0, 0x5, 0x8, 0x6, 0x8000, 0x16], 0x101, 0x80}}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x10001, 0x7, 0xffffffffffffffff, 0x10000, 0x63, 0x5], 0x5, 0x583}, {0x1, [0x0, 0xffffffffffffffff, 0x7d7, 0x0, 0xba99, 0xab6], 0x5, 0x8}}}}, {{@ip={@multicast1, @broadcast, 0xffffffff, 0x0, 'rose0\x00', 'vlan0\x00', {}, {}, 0x0, 0x1, 0x4}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x7fffffff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x420) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) getegid() ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000b00)={0x5, 0x3, 0x4, 0x404000a, {0x77359400}, {0x3, 0x8, 0x4, 0x7, 0x255, 0x1, "d4a9204f"}, 0x5, 0x3, @userptr=0x8, 0x4}) epoll_pwait(r0, &(0x7f0000000b80)=[{}, {}, {}], 0x3, 0x6e, &(0x7f0000000bc0)={0x401}, 0x8) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = add_key$user(&(0x7f0000000c00)='user\x00', &(0x7f0000000c40)={'syz', 0x1}, &(0x7f0000000c80)="2c074ea2fb0e847bb2e3a14936d81e24c925ac190599c281eba66b3d7f4302772c51aa59570378ffca4738176c4d7e911d6875743b54e86b8d47b66cf438bdec62e2aa0e7f52e6f8c23fadd2e7303e42fd0c8b7944172c7fdfea8a4bea98d5b6113f66c84e4fca4d6bd50731", 0x6c, 0xfffffffffffffff8) r2 = add_key(&(0x7f0000000f80)='rxrpc_s\x00', &(0x7f0000000fc0)={'syz', 0x3}, &(0x7f0000001000)="864616699a691eabaf0d872b36617f00d63c554db2567c42376f1d8bc262234e006b2f38e8407d45c0148533362bf6263fc9eeb8a26476bea7c6f4edb3c06d8502141d8b06aceafa600f16cebc4f642de9f93a87b60d03dc624c31b44ae03cec97fc138c391586853cba01ca2ccf19b1b8589a706ded79061a46611944f0bb3b6e7d9854", 0x84, 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000f40)=[{&(0x7f0000000d00)="f3acc8fe2a38d2e45586663c32f5c65ea9d111d274523edcac858734aeb23c3b3206a9289c5291f5b261784413bf8bc76bc5b0aa8e31ddd11b1abe5c6aa0435a3794d6b23ffaa6487e9d13d8b1cf3dd0264c638a89ae3995acb7be02ec9d3cd35c80c719982362e84cf3e05e7e392797271b026c69e18230031d5df64f9b6a5436664ff7017b41cd6faf9a", 0x8b}, {&(0x7f0000000dc0)="44fe97715c9253fb9f0f15c424c2a2dbd26d77a30a4678c86bc8e68a18399fd7ac13787c34172828879d0f096da74a27f55c333016dad58698be6ab5bdbbaeea4e12d5cc38578d97cf735035376f6f04cae668380d89e4b8dd456ce2e2c54d46097c0c3a64bec2ab79f6853fe0b23209f42d3c4b16f5b3808fc60ea7f71e0fc87face1c141d2fa4b6461b3818a975c0bc70e324b2e7b8d9b9668", 0x9a}, {&(0x7f0000000e80)="bb02498219c3373ee6b0b7b968c23d75be031fe9954063c2ed748593", 0x1c}, {&(0x7f0000000ec0)="b7f27bcba437d017e9783bc335d39c392f8fa57ff592994238988efd3d8de3880db198cdd8ea5bb1659011bb0f24da51876268f5b171132aaa000d309ed8ef01888e000632181a1e7b70f1f53e3a7e16fd07009676166b0ac6d171d9", 0x5c}], 0x4, r2) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/full\x00', 0x80000, 0x0) accept4$inet(r3, &(0x7f0000001100)={0x2, 0x0, @loopback}, &(0x7f0000001140)=0x10, 0x800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$sock_ifreq(r0, 0x89bb, &(0x7f0000001180)={'veth0_to_hsr\x00', @ifru_names='hwsim0\x00'}) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xb) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x9, 0x3d5f, 0xf9b}, &(0x7f0000001200)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000001240)={r4, 0x3}, &(0x7f0000001280)=0x8) pause() r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000001300)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000013c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x1c, r5, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001400)={r3, r0, 0x8, 0x1}, 0x10) 00:57:45 executing program 1: r0 = socket(0x20000000010, 0xa, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x79a) write(r0, &(0x7f0000000180)="240000001a0007010000b404feff1400020b5aff6410b50000f07f000200ac142c10a22b", 0x24) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "271b791f3daa56d16078ed89f4a6d97e0d4f0be3"}, 0x15, 0x2) recvmmsg(r0, &(0x7f0000006880)=[{{0x0, 0x0, 0x0}}], 0xfffffffffffffd4e, 0x0, 0x0) 00:57:45 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x1104) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x98) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x1, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0x4, 0x4, 0x80000000, 0x0, 0x388b, 0x0, 0x6, 0x6, 0x5, 0x3, 0x1000, 0x3, 0x0, 0x3, 0x5, 0x7, 0x7fffffff, 0x4, 0xacb}) 00:57:45 executing program 1: r0 = socket(0xf, 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10080010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x400, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x5, 0x9, @l2={'eth', 0x3a, 'bpq0\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x4041) write(r0, &(0x7f0000000200)="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", 0xfffffffffffffe6b) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x1) 00:57:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000000)={0x0, 0x2000000001, 0x1, &(0x7f0000000300)}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x8, 0xa58c}) 00:57:45 executing program 1: r0 = socket$inet6(0xa, 0x8000000000005, 0x0) shutdown(r0, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, 0x0}, 0x20000081) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'veth0_to_team\x00'}, 0x18) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x2001001000000000}}, 0x1c) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) sendmmsg$unix(r2, &(0x7f0000001480)=[{&(0x7f00000014c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001400)=[{&(0x7f0000000100)="b9aaf42ce712e22c14497733ef", 0xd}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="78d9008e999b510151c192676f971011b413c2d303c1a0c11b3f0479578650561eb0b57bf56dfd8c5c12c9a91ddee01e9383dfa2deb07337ad522bdbf649435161733e8f3f1c63d32114cc69e1fa7bddcde07237ca4d854e42280d5c80f38516f58a13444d7edd449c3d421986326232f3c0e03443e0e785d968210ec02338c8ecacf55bdba75ba04943338b30a3b8fe17e836bf5e364745fb847ab13da8ce92720607d95207132a6684fb21abff0cf3c5057575ad0478651e0ec03c9656cc34aaf2d958dc2f5941bb1107a4f35b91ed720d7afb4bf1ddcc", 0xd8}, {&(0x7f0000001240)="ddd79f8e1f8654cf869d615eeb991ae61aaf9763e2c4afecda99fd0a1fe433ed4081d5d5de4f76bb7968", 0x2a}, {&(0x7f0000001280)="d186a449a328624d3d6677a620bb0933ec6c725c12dcda9702f4be110196e998201b13d6e19ecb2a1f12205f23a94b312d6db24023693be5074a2327bf2eafeadbbf736bc8b89e98d0b404b895986b78c79ee92844c5b6cdb230f6bf26587fb87dccfd7169d3c98a0df4007b6c77556e15acfbcf11799cb0ab0680847f97795f7dde87572c732e219455841ddb278c98ee2ccf0a443321e5b49c86509411f8ac9045c7e822b4ca77fe38017347bfca69a5458bb0b4fe66eb750ecbf58243a5a1ba34a44c7c59b5ab797db98a86874d5103fb0c21bf", 0xd5}, {&(0x7f0000001380)="ad50f48b1c89754e86f8115572d7516e739ffdd079d6c3c829c5b68736a278a84ae514f02b36624b3281e72aafead730888645237864b81639d3cf6bba0cd28f39d4", 0x42}], 0x6, 0x0, 0x0, 0x20000840}], 0x1, 0x40) 00:57:45 executing program 2: r0 = socket(0x800000000010, 0x8000000802, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x4}, 0x2, 0x2) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x28, &(0x7f0000000000), 0x20a154cc) [ 249.585534] IPVS: ftp: loaded support on port[0] = 21 00:57:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00fb150000875fe20000000000000000cf95000000"], 0x15, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20081, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x8) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x3, 0x2, 0x2, 0x80000000, 0x0, 0x10000, 0x8001, 0xc, 0x8, 0x80, 0xfa, 0xffffffffffff70fb, 0x800000, 0x7a, 0x5, 0x1000, 0x7, 0x1, 0x5, 0x4, 0xfff, 0x5, 0x7, 0x100000001, 0x3, 0xffffffffffff7fff, 0x10001, 0x5, 0x80000000, 0x18, 0x8, 0x2, 0x4, 0x10000, 0x8001, 0x8, 0x0, 0x1f, 0x3, @perf_config_ext={0xf2, 0x7}, 0x3008, 0x9497, 0x4acd48f8, 0x7, 0x4, 0x80000001, 0x101}, 0x0, 0x9, 0xffffffffffffffff, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x101040) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x900, 0x0) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x7ba, 0x141000) r2 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000b22000/0x2000)=nil, 0x2000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) mlock2(&(0x7f0000b1f000/0x4000)=nil, 0x4000, 0x1) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000000)={0x9, 0x7, 0x3, "a3dcf901e777a465cb27e3442a1b19679f70ddbbd6fdf2e26e018050f628af50", 0x31337d4f}) mlock2(&(0x7f0000b24000/0x1000)=nil, 0x1000, 0x1) 00:57:45 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9001}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:57:45 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000240)={0x1, @win={{0x0, 0x0, 0x3234564e}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 00:57:46 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x505401, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x23) [ 249.927666] chnl_net:caif_netlink_parms(): no params data found 00:57:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) [ 250.045774] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.052419] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.060505] device bridge_slave_0 entered promiscuous mode [ 250.131443] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.138203] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.146392] device bridge_slave_1 entered promiscuous mode [ 250.217805] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.278981] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.325393] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.333803] team0: Port device team_slave_0 added [ 250.340144] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.348549] team0: Port device team_slave_1 added [ 250.356239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.364908] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.567402] device hsr_slave_0 entered promiscuous mode [ 250.742248] device hsr_slave_1 entered promiscuous mode [ 250.902854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 250.910331] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.937666] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.944226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.951264] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.957834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.973523] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.991985] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.064373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.078189] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.090713] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.098570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.106329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.122431] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 251.128555] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.142366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.149622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.158246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.166450] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.172990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.184982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.192867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.201398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.209493] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.215986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.232706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.241889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.254384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.261402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.275696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.299624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.308400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.324016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.336460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 251.345138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.353312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.362394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.371051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.379818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.395285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 251.406252] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.417651] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 251.423852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.446338] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 251.455043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.463282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.488096] 8021q: adding VLAN 0 to HW filter on device batadv0 00:57:48 executing program 3: open(&(0x7f0000f9aff8)='./file0\x00', 0x8000000000141046, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="8ed2dfddf144ed837e6fa228a99980db607b19c661d20acf0295ae79c94a3187e2e2492690f2982483fbff64af5343c42b08ed9a9391d93959256a1060156f5b0ce49ad16d4b7a10eb9226a3488234f01f2f26bf06e6edcc422feb8bb99c0c73fffb1199ba0c89fd81f9b249bec5b67d16aaa0d9bed37b308096680b7ea06cdbf50622942eccd0ffdf9b67244dbd3852f624f0e66a627fa593d814e71f03be4724c159300e54b75600d38aa4d0e0db1fdce241"], &(0x7f0000851000)='./file0\x00', &(0x7f0000a6f000)='nfs4\x00', 0x0, &(0x7f0000dedf2f)='v2') 00:57:48 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) r1 = shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmdt(r1) 00:57:48 executing program 2: r0 = epoll_create1(0x10000000000) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x401, 0x543000) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x1, &(0x7f0000000180)=0x7fffffff, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x8b, 0x101, 0x1, 0x5}) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x7fd) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) recvfrom$unix(r2, &(0x7f00000001c0)=""/83, 0x53, 0x40000023, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0xfffffffffffffc8b) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f00000002c0)=0x4) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000140)=0xb5e) 00:57:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00') fcntl$getflags(r0, 0x40b) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000140)={{0x2, @name="8f95d2e5c3393ffbadacbb95b105bf11eec526d4509e195f3ad59ea148dca8cb"}, "7d4ef2240467a7e75f12e2163159ac55420ed66ac87e0adb42656fb421a2586e", 0x3}) openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\xba\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:48 executing program 3: r0 = socket(0x10, 0x200000000000803, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200c80) write$P9_RCLUNK(r1, &(0x7f0000000080)={0x7, 0x79, 0x2}, 0x7) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000304a02bcf75f27ba46e3156a", 0x30) [ 252.860526] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 00:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:49 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0xc002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000080)='bond0\x00'}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000002c0)={r2}) r3 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0xca281, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000540)={r4, r1, 0x3a, 0x65, &(0x7f00000004c0)="caa9cebce0f3707de19df0cb345af4ed881312a1810075a1f5eb86c5cffb23b06350b98fb2d47466390ebe5ffb34046e5977af0e337f23db1dc7b0d08818578a830bd893c2f9d0c3c257ab727df3e252787dce4392b20d29ac742d531151c6f2425382740d", 0x40, 0x7, 0x1, 0x6, 0xfaec, 0x3, 0x80, 'syz1\x00'}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000600)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x6, 0x7, 0x100000000, 0x6, 0xa0}, 0x98) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0xbdd, 0x8}, {0x7, 0x80000001}]}, 0x14, 0x3) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_netfilter(r7, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="da60a08704906a5f3ab50b5827f3c4e449fa5b03c9b868fd75efc00fa3f622939f359b315f131f7882e9d79f7a57b2688de4dda98b795ba5b7c34c96e3da77bb8cc39b60ed2e0b4b78b5dd059a4556b5fe3e3bd6362698ffdded64a9a123a96f3362378ddb8ea795913fec7095b398b900c3562c1c1d860cf9694d51b9cad3ab2ec2d61e8fb56d6b15cc86fade2663000064837a230fb18d38c6bfa41a19", @ANYRES32=0x0], 0x4}}, 0x4000011) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0xfffffffffffffffc, 0x87}) ioctl$sock_inet_udp_SIOCINQ(r7, 0x8905, &(0x7f0000000140)) 00:57:49 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400040, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x210080}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x18c, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffff8001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffff000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'lapb0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d76}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x40801}, 0x10) r2 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x22, &(0x7f000001bc78)=ANY=[@ANYBLOB="0500000002000200000000000000000018000000030300000000000000000000090000000300000022ffffff00000000ffffffffffffffff07010000ffffffff58020000ffffffffffffffff58020000ffffffff03000000", @ANYPTR=&(0x7f000002cfd0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800520000000000000000000000000000000000000000000000000028004e4651554555450000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a80010010000000000000000000000000000000000000000000000000400435400000000000000000000000000000000000000000000000000000002000000000000000000000000736e6d7000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2e) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x22, &(0x7f0000039d18)=ANY=[@ANYBLOB="0500000002000200000000000000000000000900000003000000faf7ffff00000000ffffffffffffffffd0000000ffffffffb8010000ffffffffffffffffb8010000ffffffff030000000000000000000000000000000000", @ANYPTR=&(0x7f0000025000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800520000000000000000000000000000000000000000000000000028004e4651554555450000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800100100000000000000000000000000000000000000000000000000004c4f47000000000000000000000000000000000000000000000000000000000050345fc21378bc8f6da6263e3715f555f23e413a61787ecaea02755a391d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005202d0000000000000000000000000000000000000000000000000009f02000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2c) 00:57:49 executing program 3: getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x8, 0x40) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000200)={0x2, r0}) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)={0x2, 0xfffffffffffffe23}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$P9_RAUTH(r1, &(0x7f0000000100)={0x14, 0x67, 0x1, {0x40, 0x1, 0x2}}, 0x14) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "58c44931"}, 0x0, 0x0, @userptr=0x100000000, 0x4}) [ 253.090035] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:49 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000018000)={0x0, 0x0, &(0x7f0000013ff1)={&(0x7f0000000140)=ANY=[@ANYBLOB="180000001800010302000000000000000100000004000600"], 0x18}}, 0x0) 00:57:49 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x2, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000003000500000000000200423b000000000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x7) 00:57:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x5) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0xfff, 0x59f}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x100) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0], 0x8) sendto$inet(r0, &(0x7f0000000980)="03", 0x1, 0x7, 0x0, 0x0) 00:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) [ 253.430445] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 253.482774] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 00:57:49 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x36, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r1) 00:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x800, 0x8}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000440)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = fcntl$dupfd(r0, 0x406, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f00000000c0)={0xffffffff, 0x0, r4, 0x0, r5, 0x0, 0x1000, 0x5}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0xc0103, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x3, &(0x7f0000013e95), 0x4) close(r6) close(r2) 00:57:49 executing program 2: unshare(0x8000400) r0 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000800)) prctl$PR_SET_FP_MODE(0x2d, 0x2) 00:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000140)={0x2f, @empty, 0x4e21, 0x2, 'sh\x00', 0x4, 0x8, 0x21}, 0x2c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$FUSE(r0, &(0x7f00000040c0), 0xffffffc8) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000280), 0x8) 00:57:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000080)={{r2, r3+30000000}, {0x77359400}}, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x20, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x4, 0x13}]}, 0x20}}, 0x0) 00:57:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:50 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x42, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x7fff, 0x0, 0x10000, 0x8}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x0, r1}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x1, r1, 0x2, 0x91}) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000640)={0x4, &(0x7f0000000100)=""/243, &(0x7f00000005c0)=[{0x0, 0x90, 0x100000000, &(0x7f0000000200)=""/144}, {0x2, 0xc2, 0x8, &(0x7f00000002c0)=""/194}, {0x5, 0xca, 0x8, &(0x7f00000003c0)=""/202}, {0x400, 0xec, 0x1, &(0x7f00000004c0)=""/236}]}) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000680)=""/137) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000740)={0x8, r1, 0x10001, 0x8}) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000780)=""/33) r2 = shmget(0x3, 0x1000, 0x8, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000007c0)=""/25) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000800)={0x7, 0x0, @start={0xffffffff, 0x1}}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000880)={0x0, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x9, 0x9, 0x1, "ef2c620a640ac637ca94f64faac07c1207ccece6a25ace31c591aa8ef62b5acba6f4b6c4b2890acadfbb0b7404668e5e15481e7bbbc49ac54189ba28eef8fa9b", "5affca703315fb78de83116dd759b860d20e816dd4b32fbbf825e1337d94eb262d284242dfef8afad2bf3e304fc4df4c938f68e2f9d9334f919e92cd4fa130d5", "99f69a6816cdd77fb8e724cce7025fec33cebfc3c92303d5bee2720f024f561e", [0xffffffff, 0x6]}) personality(0x510000f) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000980)={0x10000, 0xff}) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000a80)=0x92, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000ac0)) r5 = syz_open_dev$vcsa(&(0x7f0000000b80)='/dev/vcsa#\x00', 0x7ff, 0x40000) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000bc0)={0x7, {0x401, 0x6, 0x7, 0x1}}) timerfd_gettime(r0, &(0x7f0000000c00)) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000c80)=@req={0x28, &(0x7f0000000c40)={'ip6_vti0\x00', @ifru_names='veth0_to_bond\x00'}}) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000cc0)) r6 = geteuid() prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000d00)={'vcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@mcast1, @in=@multicast2, 0x4e20, 0x3, 0x4e24, 0x81, 0xa, 0xa0, 0x0, 0x2b, r7, r6}, {0x5, 0x10001, 0x0, 0xed1a, 0x0, 0x1, 0x8, 0x3f}, {0xffffffffffffff02, 0xf79, 0x3, 0xffffffffffffff7f}, 0x3, 0x6e6bb3, 0x0, 0x0, 0x2, 0x3}, {{@in=@empty, 0x4d6}, 0xa, @in=@empty, 0x3500, 0x3, 0x1, 0x1ff, 0x5, 0x1, 0x1}}, 0xe8) socketpair(0x11, 0x80807, 0x0, &(0x7f0000000e40)) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000e80)={{{@in=@empty, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000f80)=0xe8) 00:57:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000300)={0x2, 0x3ff, 0x2, 0x9, 0x2, [{0x9, 0x1, 0x80, 0x0, 0x0, 0x80}, {0x800, 0x81, 0x3ff80000, 0x0, 0x0, 0x2000}]}) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 00:57:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000100)={0x8057}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x39, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) 00:57:50 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8040, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='/proc/capi/capi20ncci\x00') r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x80012, r1, 0x0) 00:57:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x1, 0x0, @ioapic={0x5000, 0x0, 0xfffffffffffffffe}}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x0, 0x4}) 00:57:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrlimit(0x0, &(0x7f0000002ff2)) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xb, 0xffffffffffffffff) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x509042) 00:57:50 executing program 3: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/46, 0x265}], 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40085400, 0x4001c1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x800, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200000, 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') 00:57:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:50 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000001e00)={0x14, 0x20, 0x400000000000109}, 0x14}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f020330df3b88a0702ea3d9d8120156c5a8d76b32a87e49f9e61292198b2bbb857b4f7b9d7585bfc7db66f028542014") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 00:57:51 executing program 1: r0 = socket(0xd, 0x803, 0x100000001) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4000000000000000, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1ff) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000080), 0x8c, &(0x7f00000000c0)}, 0x0) [ 255.158022] IPVS: ftp: loaded support on port[0] = 21 [ 255.396994] chnl_net:caif_netlink_parms(): no params data found [ 255.459923] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.466540] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.474743] device bridge_slave_0 entered promiscuous mode [ 255.485711] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.492339] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.500576] device bridge_slave_1 entered promiscuous mode [ 255.534957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.546310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.574190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.582617] team0: Port device team_slave_0 added [ 255.589562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.598077] team0: Port device team_slave_1 added [ 255.604491] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.613391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.776080] device hsr_slave_0 entered promiscuous mode [ 255.944145] device hsr_slave_1 entered promiscuous mode [ 256.152963] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 256.160460] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 256.192243] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.198761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.205852] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.212439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.300508] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 256.306815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.324150] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.340716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.350408] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.361266] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.376355] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 256.393195] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 256.399316] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.416595] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.425957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.435190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.443324] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.449761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.466201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.479838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.491173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.499749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.507940] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.514418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.523027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.540763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.552608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.563712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.572762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.581257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.593995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.615055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 256.623703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.633079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.648028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 256.655009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.663545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.680269] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 256.687631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.696006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.713899] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 256.719994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.749329] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 256.770842] 8021q: adding VLAN 0 to HW filter on device batadv0 00:57:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:53 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x80000000002) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x8000000000000053, 0xffffffffffffffff, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) clone(0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000480)) read(r0, &(0x7f0000000380)=""/42, 0xf0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000), 0x1) 00:57:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xa, 0x100000001, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x9c, 0x80) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000200)={'raw\x00', 0xff0c, "0b4da7f975478ea44a3c4b62a2c87120febee7da9aeefb80e3b5886adeb9a3c1e7b5c716b29ef1d2026d1420f964"}, &(0x7f0000000280)=0x10c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) 00:57:53 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1ff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x5, 0x5, 0xfc2, 0x1f, 0x7}, 0x14) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000180)=""/101, &(0x7f0000000200)=0x65) getsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') lseek(r2, 0x0, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) write$eventfd(r3, &(0x7f0000000280)=0x3, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f00000002c0)={{0x5, 0x0, 0x6, 0xf0b, 'syz1\x00', 0x37d}, 0x0, [0x400, 0x0, 0x7ff, 0x4, 0x1, 0x4, 0x5, 0xc22, 0x4, 0x4, 0xffffffffffff29a0, 0x1, 0x7, 0x3, 0x101, 0x7fff, 0x9, 0x1, 0x7fff, 0x5eaf2bb8, 0x9, 0xfffffffffffff801, 0x8, 0x7af, 0x7fffffff, 0x5, 0x4, 0x56c7, 0x9, 0x0, 0x4, 0x204000, 0x3, 0x800, 0x7ff, 0x12, 0xc90, 0xfff, 0x2, 0x0, 0x400, 0x101, 0x3, 0x310d, 0x9, 0x6ce6, 0x5645, 0x8001, 0x1f, 0x0, 0xdb, 0x7, 0x100, 0x3, 0x7f, 0x800, 0x1f, 0x9, 0x3, 0x5, 0x8, 0x9, 0x7fffffff, 0x6, 0x7, 0x4, 0xfffffffffffffff7, 0x78b0, 0x2, 0x9, 0x1, 0x1, 0x8, 0x3, 0x800, 0x3cd, 0x7, 0x40, 0x1, 0x6, 0x8, 0x7, 0x100000001, 0x80, 0xc4, 0xfffffffffffffe01, 0x800, 0x1, 0x80000001, 0xfffffffffffffff9, 0x8, 0x0, 0x8, 0x1ff, 0xffff, 0xfff, 0x6, 0x7, 0x81, 0xcab2, 0x400, 0xf8d, 0x6906, 0xffffffff80000000, 0x3, 0x5, 0x8001, 0x7, 0x4, 0x5, 0x3, 0xa47, 0x3, 0x3, 0x774, 0x0, 0x8000, 0x240, 0x401, 0x4, 0x0, 0x1000, 0x8, 0x100000001, 0x3c00000000000000, 0xfc1, 0x2, 0x1000]}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000002c0)) 00:57:53 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/capi/capi20ncci\x00', 0x480c01, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000001840)={0x6, &(0x7f0000001800)=[{0x101, 0x8, 0x100000001, 0x81}, {0x3, 0xff, 0x3f8, 0x5}, {0x3, 0x4ce, 0x3, 0x7}, {0xffffffff, 0x4d, 0xef, 0xffff}, {0x7fffffff, 0x9, 0xf7f7, 0x6}, {0xef, 0x7fffffff, 0xfffffffffffff2ef, 0x800}]}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020f000014003b6fbb740000000000000000000008001200000003000000000000000000060000000000000a000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000080000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000"], 0xa0}}, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{&(0x7f00000000c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/139, 0x8b}], 0x1, &(0x7f0000000240)=""/38, 0x26}, 0x5}, {{&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000300)=""/64, 0x40}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/44, 0x2c}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/3, 0x3}, {&(0x7f0000001480)=""/210, 0xd2}], 0x6, &(0x7f0000001600)=""/224, 0xe0}}], 0x2, 0x1, &(0x7f0000001780)={0x77359400}) [ 257.145100] IPVS: length: 101 != 8 [ 257.177999] IPVS: length: 101 != 8 00:57:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xa, 0x100000001, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x9c, 0x80) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000200)={'raw\x00', 0xff0c, "0b4da7f975478ea44a3c4b62a2c87120febee7da9aeefb80e3b5886adeb9a3c1e7b5c716b29ef1d2026d1420f964"}, &(0x7f0000000280)=0x10c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) 00:57:53 executing program 0: socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:53 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x400000, 0x0) mmap(&(0x7f000062a000/0x1000)=nil, 0x1000, 0x1000000, 0x31, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0x40045532, &(0x7f0000000040)) 00:57:53 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000280), 0x0, &(0x7f00000002c0)}, 0x20000081) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) 00:57:53 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0xfcc, 0x4) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r1, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000000c0)) r2 = fcntl$getown(r0, 0x9) syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/mnt\x00') 00:57:53 executing program 0: socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:53 executing program 2: r0 = getpid() clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') sched_setaffinity(r0, 0x8, &(0x7f0000000140)=0x2) pread64(r1, &(0x7f0000000180)=""/49, 0x31, 0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, r1) accept4$packet(r1, &(0x7f00000034c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003500)=0x14, 0x80000) sendmmsg(r1, &(0x7f0000008200)=[{{&(0x7f0000000000)=@rc={0x1f, {0x57531bf, 0x9, 0xa6c9, 0x8, 0x4, 0x3}, 0x3ea}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)="2e60a89705087c6f8de159b2611cb8dfac54f6d242dd19b96df1f2873c", 0x1d}], 0x1, &(0x7f0000000440)=[{0xb8, 0x109, 0x4, "273136fc3bcf3f6799a29d225521e96f0f7844eb8f9320bbac09939a28c6c465294e4502da7b58104c45374f3b0406e56f67a49f9939f562bf4d6219eaf8c7e5527edcc5ee24e2cf24040f93822a34fef8424152a965aafd2591e846eb6128536521ce2c4577acb6625277b6f6a2325c530b75a0fdc728473bdccde86ac349e3d8cd4822398b9a3f4aad5a59bf5da2cd64b99a103aea34676373983948b7a7a104ed1a746cf2b790"}, {0xb0, 0x10b, 0x6, "b755d10f11a76f3549dac60588104df7aee77d7f8d1ad62ed6edd82bad17d5a35c8faace199aee1e58b52ff928305ff18c02c493b9ceba999dbfa90cfaba5ab87ddbbdc323ec0e4a57ba6153092aedca09cbd4eb18a610c408a5fe75b8dbcacaa438f563b40f7e262b1f9fbeb4d321a6d8cc4c1eabd1a3744755e04cc5d07cc87d7de9dbb38d596711e30ebb6ead852e694db731b3c5201e44"}, {0x88, 0x1, 0xfffffffffffff6c9, "03e334aeb225050f0e8a7271ea09ce9a6f1c79657889e5a4a761c43ec8e0e81ccdf88cf744e594eb07675e581dfb66c19e8fca811819373311851e8cd10c1be59c4e160596a522ff6a3e85b759f715849c1c2a8a4bd73a89a90f19642ad9c64ec8d9a40ad3e32b97c8775dafd5b4b6af1764b681aab140a3"}, {0x80, 0x11f, 0x1000, "bce03582b45cff5026ce3f962844d3497e52cd05d609fcbcca7b4533e8413be96ca251a7232f1baaa214a0cc8e64a8dc729b7c8bfb774b3c12a65ef73869db45b916c04f453d305ca00768ca7f494be35cfc69a24cc2fb75563cd9314b0c4c5e5dbc52b1d67bdf99a1ba60e24f"}], 0x270}, 0x453}, {{&(0x7f0000000240)=@pptp={0x18, 0x2, {0x3, @multicast1}}, 0x80, &(0x7f0000001940)=[{&(0x7f00000002c0)="d6169612f57d12a5815603d40e741e86cf5e007d29894679b0148e3f4e4acef5a6c6194438f968122fdc3349ec7a5a6e0cfdf256f1c980ebf1e46b11e11d868f62e47af6eeea0aa15da988c1d921f8ac7fd761bea112a92e057075ac008eefcbde45a9a1857cb01a515a01751687ead3edfdac9cddfeebf3329feb6efa247b", 0x7f}, {&(0x7f0000000340)="2d0f42895e539b7691ca5fad993b4f6d3a3b5b36a20ac17e1c0125f4d2f2f17e69af810ce2243eb9beb49caaeb5f79012bbb4984d615692bad6583e87339e3f4cac92d7c8ccd254206f2d0eb64acd5e8ff753af687233478440b8c5b5a2f4e868e2f24f772ce0bb5595817160b2e", 0x6e}, {&(0x7f00000006c0)="bd8dc9ab390a9ca6c95163a6a8438a91203423bfeb7405fdd4714cfb3ab8cc794a2174a43dc52115b8a82f1bf7531b7cac4eccfe8dcf9060530fcb134b728fa2cdd191607af53d97a1f671a8c4bcc32ea51c11e7c4b4a37af37f2ebe9fe9a59a906ff2cd3e4f10ce8dd0e8ac6a1e6ae13058112e23937efa5b50a7efb40aa62692bd53743d11954096601def492c0af9135e7c8db5754bb923a10ba99ae3887a49f5df", 0xa3}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f00000003c0)="9c5793c6ac8ae53b17332bcba0afdc855c0379771f50feb9fc7d32ef8b375b0dd48508ab4e44318e2c4f5bafc93e56", 0x2f}, {&(0x7f0000001780)="e579713faa9c4689caf75352ac88c1f101e6b89ea6", 0x15}, {&(0x7f00000017c0)="0e5430848309d182b309d29ac0c915e86a3bc550d8f0e2946daf0d59e34e029d7d308559a7825beaa01b54affa7a5a2305d0603847e985c27956750f7117ceb4b66d33ebaee10eab10f216d70bf11bcb000398ef3bb8071b30cff889eeebcce251f1f1bb6ce64fd5043b3dcbf4d08afee79ab0b1212cfea21de38ed684", 0x7d}, {&(0x7f0000001840)="f7c8e62a89364acbbc142e1da4bd81a53b38cf0c705b04c440b168c6f4b6cc41182db500756ab10c365182a13dff918ec8bae30c1ff9bb0cc1d010780c6877414381d2226357851f25393b03919c1bcd53011019ad02b5f9624eca5b4fc77c07638d483844cad85b4fd74c7bd791a8", 0x6f}, {&(0x7f00000018c0)="0a1302879636431b4518127ac6b7c289c37282fb2233ce239c1d52c0003010d6a6629858889b960125889485cfd9ba179e9d06064426fe0eb206f492c2f186b57d0b891b65d13dd13e4c760ec935a36189432f54f946508450a43c2e18ca735fda3de7702da9", 0x66}], 0x9, &(0x7f0000001a00)=[{0xf8, 0x100, 0x101, "756450c5261133a3313f752f87607a9475a44dfd99ce8e7a7be37845dd8ceb041ec97c995c27c213535ae625793c7c01a988722806e98c30f11d2189f4d4d6bd5209c552b99121a14a13309041ea4aaa6f05b94e88fa48a93c84d9e3cd4c7761751cb16ba769eb03041e2f94a044a24256b557e14347230982f3bdfae03218fb333552b4ce96f03f7506d9a9e2f461157824e3e84963d0fc209b2fdc634473f591e97a90aeeeeade76a0822e7b74a21e52b5fa7aad815969f42cfcb18583e7f55c0112b5512441900202c8454efaaada8b4dd14d52e49521e21ea150f4d4038a304b4bae"}, {0x1010, 0x101, 0x7, "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"}, {0xc0, 0x1ff, 0x6, "33277087db7af4830c2b78e072708f97e57c8664540a010055405dbe5544a25b3b9b1eb1d62fd8074a6463ad6ea4e6a76e98060b7f763437ca3914e92093c5d4a2a425cac6b7d45cbfc0c97552c55c9b908b7552f8cf33624010bc20ef4c06db365134e268e558a3f37e62c663ccffb39e268c92a540057971929de8c330b3f722ca79d2196c73cc0e84c6a0cca9bdd57cd9a249090c0902c8ee4dbf4ed6c419ef50372520b5632971"}, {0x88, 0x114, 0x2, "8431df32c89ef524672d60bd06127d1856933b05231664cc6365d33bd7f0f940a06a08e136835f9b46afe8839ef3b1bcc5f6f492800e737d1a7b9903a3c61b3187c4907641e33239e4a34521d64f1015bd60eb6301cc6fca1340a0e9db2f4c900f4f942118807c0a8d34a05b4cd8bf11d8cd5e"}, {0xe8, 0x10a, 0x3, "1601f77ef9763931ac3d15dae3bdf67c5abc1d75afd0fb87a88f81b9ea8dd35f7b3182e2ff155e66b468109a671ee9990a575f1ec8dab8c795f7c352281f98e125dc23822d2f1950e608a57f3180ae1f033edcb3523aea5356132179aace3ada9481d89a9d82dae3ca8104c8ed0fa2628af68ba2ff9b547276b85b3c1021fb78c8c76e22a89cc6ba9079f0d21e668925533fea1e1860861f0dafac950348c251162405bfa11f6e3595ff93592fd41f1405664ff8980ca08470e3493dbb128087fc12539ff21d9918bec4fe38f5f17a642e306b883b6fb7cb"}, {0x110, 0x10f, 0xffffffff80000000, "630ef8bc79e0fbb75fee6cfb357d8bb3cf7973a08f76f092e7c34df3e9963ad93ac28f6fe7715600ba17162bb77248fc4358eb172c3fe988de61ba791a1e76bec2b4e052a5411b6f3ea508af59f369db9052e9c194897ad98e7931f0d3e5831de5b9c7eb3721107e643b3c60784133045ef257306d092d9f2595c771d6e3bed1b01f8b204c3662cb6100ae3725fe656439ae408942cd3e40d5fffe1a8200f5f76b88d4b7c8185cff6d0154ff19a30411811f5e83f75398813289d8f16676b1bda08c997f42497ec678764838ef7f91ba8be102a3835afafc7edcea8140f141a218aa8639d297fd0ae944a0eb638bc512d2fc412f29a883808f"}], 0x1448}, 0x4}, {{&(0x7f0000002e80)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002f00)="cef236de663cd5e8949406fcd23cd525d91686b6feafae8c2f6cbbd002ec02ecf0035edd315c3e37d872853b1e5111e22faab5b1cb8ed77f6221c480501cb981bb5919d454", 0x45}, {&(0x7f0000002f80)="fefda8d366cc22bd1a35db52f101acb2e21263ab9dadd2ea75567a3c33df71b86d350b2f6d0b51c7231c8052e5e686b4ba5958ae0cda37c3362add3130192514c3caee", 0x43}, {&(0x7f0000003000)="a9eb27dae0565d394adbadbe007f970af137f5e093de778246d21e616727040229d347a1", 0x24}, {&(0x7f0000003040)="a4b8b09b11f69fbbf8ed17b8a00df720d38d016c9e5563066c716a9d5f08d375243f8d96148f62e276e2b8f882b20c0f0e0c278bcd62763201470f0da6e2875699bb50403aaf2f15b4d50b1b4035d590715f0928659485b8b6b8b164e2f89d2e5fd5e1881805e94510f8e8a66012980a9da1cb25472a7fcf3be2f46754328e49ba97adeea49b339749e0728da8df5b44f183d1e2711980fa301771e0aac61409d2cb1b1277704963dcbcb4a5dd82cf3b873c85eda4", 0xb5}], 0x4, &(0x7f0000003140)=[{0x80, 0x0, 0x1000, "fcc620225cacf5d9a685d6f96c045d44766e3aab544df6a701db338c8b248300a416b4b0abda9e837aa10bd02943bc67c16786ecb6b91a6f9c301df456b9b54b3010b998950d30c9f8dd69a89e99638a60bb9c17ecf15ab979b84f441d1e39f13b1bdfdfa5d3aab13f9c5d2355"}], 0x80}, 0x2}, {{&(0x7f0000003540)=@hci={0x1f, r2}, 0x80, &(0x7f0000003800)=[{&(0x7f00000035c0)="d1eb", 0x2}, {&(0x7f0000003600)="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", 0xfc}, {&(0x7f0000003700)="9f1dad368c8a9581b59f96058483f8100c08beef820199bc5bf087cc0965361748ed89b5edfd9c236fda66bd10c714c4027838d41964ed4f2dc289dac95db4b78c26", 0x42}, {&(0x7f0000003780)="b602ba537e20a8f6ddc39e1e20b539b31b2744e0a28963480891b3599adecca47cb5998855e01bcd63b77c930c15663180bbe9bbdf7faf5cc72fba5b960f7af96e964df739823d963b252f840f5be3431cf8a7339e5b481c34bb60f7fa356ee9a15f9cd398c07cd9bc729c53ec69c48c1d64bef7e8cbb7", 0x77}], 0x4, &(0x7f0000003840)=[{0xf0, 0x111, 0x0, "0aa2d2397497f11cfe1a08132f7ce6543a6c8dcef9e0ae2f08e9b8b54139a9673d196152bfd520fdcedb31dda226ff58808119f1a38bd6a6c87b444c8c98ca13414f2cbdea715b6ab8b954a55576d1c17c8881bdff5b351ec31f26679aaee70741f5bac863883924e493657a82c12b0e83a176e94e9935d9d40693cdde809cf762df77b91b96d892d62c9ebb7617f5be976080f293f7dcbf3482d5545c3d75d1bc9e050c110ab6c3ecce4d2d3ab237baf42a25715901f5d0ab3fbfe6cec7f7c4c131c6e3c6e5f4819915f5c0926eb01d86f9ce4c692bbca319997b4c8bb8c1"}, {0xe8, 0x1, 0x401, "fa16f0ebe0d30a61bd44d8115efbe1d7acd0ff7ba82ccdc69acdd21ca0ae690b644123fe8c56ada35b8b8f6895c3f1f4b9823842a080dddefc53e4663181f87a0c38f181604c4e136d47cbef24af221bf915970ccff17c3612fd488d0b34e9fb790076bfc9cd630022b8dddd2cb90b0a80499ff3f722deaf504477d8aa698b4750a6786cded09f9ad82541c1bdb1ca6279ef61ee50526efb8cb27bd742772ce5764cb74cee4172df2d8cf130d877af84632b450c98aa5d2d6605768b08e9c8f2715755f5fad0c1436b0e724821feb075833a2ad6d6"}, {0xf8, 0x115, 0x0, "13d84abc1625864a0c8f417b9d81a75a586d769428039ba7a2c42a2cc9dbc3ced22e68b3fca15ac692db39dd392d5770a29f92a6846929ea7d8aa88f8df107f73ddd51ba65640c4c75f79502d7fc4578855eafba4c838f2fe0f2c7b49719d34dd7fc9f31e9d31e39271887a0c6297c2de9f5d9501d33e50e8f47033e8c779b8be08533fbcbc6da48ed7e152b03b0172dd28d72509fd36f35399650cff92bd3131eb0c68547328e6c7d4a252508b25343fd92df21d41ce901ec97fa61be8b8dfc401b166147d1d487ec303e517e0af3703202e5815f30919f9d18fd4d9b91300429b9a1"}, {0x50, 0x19d, 0x7fff, "fd3cc67b0cce96ab6c069116ef06fb56e559470a4437cf6e479bfedcb1f159e7b47904fe042725190d74ad4616cf846c53c0641c9a36bc06ecfe5d98"}, {0xe8, 0x112, 0x1, "a3e5f0a025fba49ddc51c96079944e5cd68c9d5f3831c7dd0ca4497e2696d2303cdc8a8371113a3918cc60d7d37d5e7c491d8358b1b34e9963b460ea2602b16a739f5b5e58ff7744dae0b9242795a253675861396d4f485cdf01db28988c7415bf9bb6d96cbb7b6ef58cfea74c76cbc1c9ffe593eb208c9556f2660525108bbf62b057a7002d607bef14406e222f5748b8871e11e0a78611d728e553c307e68434be4a8667056c71a8c2ae4fc230b3577bf52a07a69cb14ec8ac9939acc48323623e0b1635135995d278e40c9dd79fa14d8f54"}, {0xc0, 0x1, 0x5, "5454d4bdbf0f12e673817429683d48282659328af558fe90bdf811715cdb1d16b1eeca2210c1c4efb5f1cff0782467af46fcab6e45ec07ee519b7fdfc8b3276ff4d47c8495445295a81c44a028c8bb6e0571a26271b7790b2acb6aa8afadf564737a1f23a776e75e1b80857d0216b10245ec948da451d988b5c9a116d68065234d12122dfcf7e55341648c25ad99664034e4026baac172b21ee541da1eb0d881367c57bd887d97ff66"}, {0x1010, 0x112, 0x400, "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"}, {0x40, 0x18d, 0x8000, "036c5359284a8bcb406e41afda9da53fad36c69133f183e4008c9bc4bafcb70e2ef1f120346aee27a70bc1731815"}], 0x1518}, 0xde5}, {{&(0x7f0000004d80)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback}, 0x1, 0x0, 0x3}}, 0x80, &(0x7f00000053c0)=[{&(0x7f0000004e00)="b06fe7b1ede99869e7739000efd18d1bba89aa7e9d2e9d5617e3f0def8a1bf803e34227707325b43d4e5f6b74c84832b0587f9cc72a85a002285e7d767875eaa947c26f724d5475ddbce8514e23a77dcb3c027ba457e760baa7e82bbdfa0877f5e972701358cd43be4ac3960b4906beff32d056609586d8906519eaa6f1ea9245a596bdb10ee55c16c5940a69fb923521511cbcafc7ae4abd112e202bafc6db75072a0c52ef19b0a78723696f81d72ecf8ef458e7755666e3e5238cb21c450ce66cbe0f12faa27213eb383", 0xcb}, {&(0x7f0000004f00)="df81ff5eeeac27345ddbc583272e8f1cb850148b2177b5dd21d3d76bda214966ca6574a79538e2f711e5cc45a4be2eedca9bb336a916990f3f219f0e10b51575d324934a853f6e94113e19222b18e19c43806b1d1b619ad92eaafd4777241202ab0c564f26321be4b9d590adbc5bf929375f77933dc8fe55c5266c8ca908c059cfd3f8b52e47b6cb1f29ff76aaee56fd6cb8f8535fee89b2adef24a289df6ab43d6e39ed4a857b5ebb69b54a0714a31396a8c349c5302799c84d9e41c8c54b8f09716cc0", 0xc4}, {&(0x7f0000005000)="ebe28314e789810a719843fb8b6ba05523ddd3cbfa9bb95d5863c81ee87d437729df9be902aefa7b8164e5cc8d24e1fccce4071177374c7a22978054b4c0f3ffe2ef26a2f22381ed8e6e8b0efee40db298152afcba79ad146f270c3badb05080570c24402ac5026bd5320bd4b65670d68837be1b92d7d7afb2d2cb274efa6312501e6e13902e4520049c7b2f54bd9e543d785b883155742a576bdf4ec0649621499475f6ef8d17785dbea9f56f527f6f350a45736bd6cdcde768321a4c21e49e253c8f1f8f9aa3b21e257f42df671b304e34079c907799c0e3182641a2d1fd1c2608c4", 0xe3}, {&(0x7f0000005100)="82812a357ba35b6551b8d7a1904eab025499263e9c2fbd1638d88299ebd28519304caa399ded92b707232a48be5299fc6bbb824e4b032345b01ecc2e87524eb67a59e4d8c16045e9b3d04b65c4472362638be7705713d2f42d396a56eb58af22a66b2447f1dac090d1e155a45b80e299c33a11e0839ddac8e1879744e73cdebc33", 0x81}, {&(0x7f00000051c0)="777fdc72df421b61859777c1be20ddc22afa1944cec63cf67511545df89c008038960840290d3a", 0x27}, {&(0x7f0000005200)="970b9a0aff869cd91e01e5d2b2183ddfaf60e591e2a7806a70371974431d6be1d1", 0x21}, {&(0x7f0000005240)="43c332508ba83577811bd68b172a05ba97831b69c362baf3dd46db9d2f44b0188642b8cac81ed5b0428d4e29c7a85835036484445d046bd74ad1060c4a3994852c368bcbca8d803671ac323d0a07fb7dd086b62f6d86148d9da806777c8ed9891c7d32531cd96dd242534834fc885268283b469f6311cf62ccbc532adc2d", 0x7e}, {&(0x7f00000052c0)="5311afaacb65118cb41b0e4f370576229034a1d9021bc702b7f42d21746e357496b4b1bc0e73bdc4d9b8430963a435d354dc0e087a1d04646b0fe2d797198c0d4a455ffc20e90921b64b8746713d3f84c38eb81ffa419bab4407ed48a1d81b3381d5ec56fc400cfd61144f4518f928788b959abe2bb47de8dc15f8585d7555b8efe32d1bc0b87181685d96a7d47cadb14f97e9a7fb7e", 0x96}, {&(0x7f0000005380)="376963efdab78c62aa6a6426750b114b5a6bcc7564b4b502720c88667313299e15807f3cd3afa1e3b344a9f426b56bc0c8f69962b2f144d62cfb1e49fdb640", 0x3f}], 0x9, &(0x7f0000005480)=[{0x38, 0x107, 0xba, "39c92dc895121f41f8ae9cc012ba380abc074af0d8ac964836814f7de971612df56b908f"}, {0x80, 0x116, 0x6, "14fb833cb31c03c710a3d12cb5bec0f1b711da9e60ed8a7a4652c1186f12844669c3319e05822c523f751f27831f58ff54b998ea33ecbd5d9852f0fe65cfab8a49b0f1346fe5fe6ee9a9fd24b0dcd660ad4d34abf1979db60fef0cfc63255b957c28de96b058e1f7e809530a"}, {0xc8, 0x1ff, 0xfff, "8c08f77c306fbfa0fb02d4d306ffd45765f45a6fdb49b12d76c2bbb324508bc75b8bda37c5f8b3ab8e34af7d6e6df177667f643b51dc910e6d38262b667dc5e064cdb657214e237cc26969d2d6a1990770e0f6b47727b7a353c07ed2174337c719936c66016d64650b450280a5caf7d9c238c83a676688318fe84c495574b88104cb4b9a0693daeddd3878c7729cdaa140e4db80f0dec0fa9531f5e8e55a0ece0b20a2b36bee2d78cb9f78466765070820dbdd96a1"}, {0xc8, 0x116, 0x4, "28da92de4762cabfbc10241c65a68717998bb8828751767e5556aec17de98af34da6ef2020b4e47db062c9143663e5c4bf2b7d24819317d717a3f0e5a26f699ceb5b8d3e275fe60a31e980a418b6d1b2f08acf181542c1906ce08905238b1e8e454694a5791dfd9468ab6f116d00ba11992c9f77bf5b0db24fafeb9a311092bdb30a708ff7f0d0ec9abcc2eb2102415fd62356ba85a63b4f6ae33433ebd22f6c486e831d91454c60cfb321116fbe0980a626a1d01fce11"}, {0x20, 0x113, 0x9, "976d3e77edcaad73eeeea4a312eb5fd5"}, {0xb8, 0x29, 0x6fa6, "388f68363c533228b2adebfc09f84b72ad08836ee6a2ee06a5536d3f7f9c0468a50efc77274a188a7957b420d82a939dbfe22663be23c86096dfb4301d3e1987f535eec4f83a02e69948e39351d9ea749aec5204f1771bd5de74d634c13d677524ee600a11ec969494175d41dbd58eeb259bbbdb617ab4c246b7e65fea826ad805742f4a437bcd7ee4ed4cd91cd1be7509898c77ef43b85555f45d41b5e01a02049d7120"}, {0x98, 0x113, 0xff, "4b8af28aa6bc5e7b99f3193f4f3a700eadf11c3414622b4d36b515fbef65e60906f2d103c4ae63dd8d6d8efd8e4576ddc4940f954702b27c08e5c7c41760bf8994c6bbcc88fdeca2b23fa63e825c27cbce786825b658c10a0c8f7d71c7ff387d657ada296fa71d49e7a0da658e50ca771e89f03f4b87790e540713b7d34ac59f85"}, {0xf0, 0x117, 0xe000000000000, "e5b0c177ddf2339aa8688a6f63662abaa20e56b6e1fa92109005dc1683d67808de2883cfd35af5fa200f1119ce41cca24eff60b5addc89f5682bedca2c36fab77e1871498039ddc4966d3fc2168c0573f78307e7115f1d0dba03c5021ff56242a287dd4fa700fcd7336610646d3ad3a5c00aca177ee8c95c9d9eadbb2ff1bdcf461f5d30f1b426dde533fa85db80fe4a28cfdf88c57ea40dbfe37b408ff84581db796b0a942580174a5854dcfb8a02f7a9fd56e3dd7fa5a8c1e77971d81597177403fbf19a27846fd6f98de492822c41fb444749ce0fd73f490c1347b047de"}], 0x4a8}, 0x6}, {{&(0x7f0000005940)=@nl=@kern={0x10, 0x0, 0x0, 0x4}, 0x80, &(0x7f0000006e00)=[{&(0x7f00000059c0)="a918b0613a35270a9766ed5899dd6574e542ad611ded601e077314b04edc0165cece8a53d3623cc7278efc1df89eb1b16789b6a1faef7062c84ce43705c930c27412d674f57cdbdd64e0c3fe17bf22af0c22eb04c95bbcd9011db244774383ea1b90a8ab0e0962604083ba369f59f6413691369d8edc474ee105f506ac9c67d8f6937c7252ea945200c8aa82e542e1100766fd713f3b6c48d46d8a34424f474ffeaa1bad48568c70023f60e8bccb92675d35ab3ab88e39adee503ab1f9257c441e9dad37e1131eb1f8078e11a932f0e843ad891859e87af1c631fb8353578fb8c68f0285467b8cb12a2b347427d7acc27b7c6c52f43aea44eca2745949fcc543cd4d3b053a162198acd2fad0521d1d308eef8e8d26ce45bc51991869607ea52a8c450237f6e3a82ca60560b7638e8340e82bf655224ccb627d8050072a871b227966c2330775ca99d16f6a2e1ea5a39550c5dd4e927f6d1b28ec5ad1531fd2da8256e78a89d7cbc3af3a7dc597692363cfcc512089003cfc08a90d29990684b0e344e7ed7e896f57dfe6e20b89821470b71e174b45ace08e7210dac351270f835e07c7b21f1bc562b1ff5a5461784affcd161b652d813351076f7e23ff49d0065ee03d924b18ab4768f2163dd0ee88bfe7a67afcdfe110f6e45e17f27fe30595a94e77a09642b1d78e65dfb6b344145effe5ec3376fba26a965e26ba4fa7d5f7eb4a5bf51873def703cf1db5e84142471e47b9469a5f9639e20426d7ccdd1f15da8b45726ba574ee7e39138a427616bc9f8f41f3d11e6718029f93444ae5bac53c2c723f2332240aab8a9397b8726603777599e6839c5cee30c4351abd52a64dae01261883b98905811545f3afb894b71c2fb80577eaf5d336c4ebcba299cff232591f2482c6c8638a05c706c84ab7eb3a99e6e1dcefeb37a4c31ee8d5ba4589838e920cc8218a446f350ef28374d61ba5490c900ddcf4c6806444d297e563668f75c22a6e90e174d4c1a61e7df58b0698947ecb6f93678c4d5df8c2d937c77e526318cde7733411bf8fe1fd3560f40dfca6c0b6dc038b864518992105fa9312091b933589036ca4a9f746e385e20f332c968514835121cd483e8017db658660e4cb7e9a59b8118e417016cf09bdc663c264a49f5be6973b1f79bd66e1d22fdc4ca114876f5dcf92443714ba1cf6a83541a87f677a0d7610ad20e3dd937eb53350b37bd3fca53508c02b958737da83343d3d8f4ce6c876db9e9a7fa67254e320fd1e67afe820169cd8977c4e5925d9b71d28af42714e2846e3db0df18de46d3052fdcded56a788bda70ff13d8e7950954e60dc248b363cb331c9076112554e58728dd39668d99fa401fd29db3cbb483332e1954b2aab8cea1de2eb3f2401a66e4b8081fd54deea467330698245eea87e9c6aaf5e7ac702a6219953322445e45215c359e0d2a1663c869f6cfb9950f961292480c1b7bc547414281a462d56e96d146929d12c2e9989c05e7b510663246d075fc85e7c6aaef5ed596395b30f526fb23a043ae10dbd25a0fe3071abf6312ec239d48a8312c866f06af16462f1ed93809d9d98db59057ae0cbd6cc1fd5c5d37b09f9153393df170de602616557f05dc083b0faf25bb7f514b124c21c881182b03e1239ce5038193c6bdbc63414eb15e49067d2759559d4d07772c563f3e7e5a6ece3508ab395b982dd29ae8f34c6ff96747860de143bbec976bcb71aa60d6a882b934a805eacd668ecc9cc750cae7a8d52061811f30e17efe5e8b38adcede10832615eec40168f0992183e3d8a772b0d2f77787f040c71dc308cd6a7fa608a9c215467bcc768e6a1ca7204e0fcb689d6eb4eef5199302836ba47973cb85d81029235986493bbe6e7b8215589cee277d1202cafd2b07b6e85ce5798f6a81c4e1672f1e13d6c93033e3a1f356b3f093a49556e5e8ef0b6715d374e774671251a2906b120eafc274db961e3b131a536aa9ff9a453ce4422208824b60c1f2bbbb2c164220ce08996d66fd11806944c645e24c4c682979de37c515026f7bddc492cbd64f8e2e0eca506f4b35406441927379821c0e0f6bfbc55e5176460891269043d26c15f2955f0da59481c2e0cfec70b89efdb7c6a96fa846de43b23f14ec4cca33c9477663939f2f2fdd67597f70d3fded520b80674fdbe9efbcfa7b78e20c58be95402aebcb83e3be4929e2bf553d3186fb7bc405c6c69e3cba6afc02930e86a6c36799bdd834e0b22fa6c98e227a901848f8a774fd92f16513b6644314d7ee1807ea777d4579d08d8017bdddafa31126f53c383a3a919a3ab35b98665a0325fca17261ae264cb99787d7cce2fdf398452d7dd4f8386e7ac34b2e91555133e09685820bd7d391079ebba6a1b719b6decc69f04199eaf36d59f42c3fdc57a2797f94f4a945f04d3e643b489e9ab70cac95bfcd43be66685d1cb8073dc0aeda2419237f374d5d7ca3be879cab879702a87ed20b3bae04a048c7e0a39b71d8077499c28a9cca2b037f049ab7037dd64a85d0b0f090cc00d0a6a65c33a697fddb42bc226aa6c9b2e7f9bc7aa5fdc7e8db73a04493317ea7b81b4f89bad453960dbffabba381aed32d456ad971bbb6ea3bd3b7085486daaf57333f3d5844885c42fdb63e27bcb8ddfe3c12f8f78f1bb5c5aae58f9feac834633ce94aea8763e65965266d70f8beb8a4be415b015b63cef771eaeba68bf4b0b9b86e00fb9342bb1e1ccbaeb3b710a696ea0cd8a3bb8f7cce55e36182ad039ebbfded084b01237c0b1e0dda7dd71ada1ed70f4d5ae0306ffc47d0657dd3a4bd0620b35bafbfa0ec599d07a7ce6d062331fe7b47cb11913b48d9ce6e6053796f560eef2f498f5732c318fa9fa013d50b6b9d6a4849f851c7ca53c101ebf47af1f01881740684d8009220d55edeff5b2c602bebe6b075391b776d6eba31c6929f11397002833724682cbddfb63728807c4d4cad127a7ab0d44e9cadb2725cf1572a0b992d0896a7f3b47f9cfe7ec82a79ce7700a696d7c56c5a305fc1ce9f0c84c7dde91d647061181e744025ba7bb64c181186133da9ec9127d060a22176bf7546e168ac4703fe62559e454285546439916bd804da89c5cd5b3665b45628b4b3980bfdb33ce6c0576ae66dddd8fff27d6f397e04c618b0c69d32134a12b811bc74499a6ae5b14a3385e8e942c72c09f166ada89b1892bda484aeca758cb695749df54999e91072c51bef5f506a48371a66f4ba85c100a90e118f82eae14a0ec878b58186881640043149e8c5ab21e4c8305443da02a13bd4bd27d092928d55c3798cd3e3147114133f8080dde17f241f32dfb10cae0ade27009b9fdaf1e53d20c5052d40adec52c858e86f384f4c77f4c62e965020766ce28985208d9f4ac90b1074c3344d3ec590af0652ba689841e48e74588f0b3c694c8bbec8e35739137e57679b40e7913fea41128c0433d059eccaa1baea580dfe3a360ca699d95ff3bb6cd0a9305952d618bb11649d710f06a2efbaf4f54248ac86024065fdb8913455ba4874589c39ff0a3bb39f8432d160b66ab5a49bc6498031a560d49fcecbecc3a9c4be943e6b4ddbb1404d8e3cad6d3c6eaacdfd55689d411b0f50d1fd7dd6e30853fcf596e48ca42c2f6a00c1fc142daf7802dc76b8864c4c01af56a95fdefae8f3bff389a38d9571b4dfaf0fa8a097c1f4c4af04b5ac6ced0deef1316aee7a1e21ff0a9bf54d91400b3b3ffed6e098ce2f4d77390fa41d1c19ea4b3cca3e780d47929cd508870f035ed3ff8cfa672926fc5b83b9864a3d0e0dc084810b27631dfe76dbc63f9485fa5b74f01bd7b560baf47a15bba8658e86fec50e51252773e863ceb380fff1a2a9c30b2561f3c9c2327d7730082ecf30490ad3332c7d93de80d8c85965b350bb0a427620697eed4c77405bb1f278cb16ea9c65c10af246a797d361fbafb4abd5dffab359e422f57e2f71d9891e0428a902170493b6f15105385c5e0ad415cff82778dd39c1fffb462c7668b31e47bb19d63f798cb8d3a8986739d2f88dc0ec0c2535447682a3414598818ec886474802344c3a6c65952d4e8d1b8ebdcf777ac84c3c5e59396875556ed8a7c00b35036f20d2f62c79fd9f595e4fb5c59d8903d55704df856d21827edc4111954e10ed3436e3f1767cd2cde0b60aef7ff4dd9989cd9eebb203a51a5a32df0b24e69466a5218a3676d549087a65e84527f21e70be66e637144ad919ed927eb3ff39edd27b27ca50aa602afeda36f5b1b46eddbf6e369bc54bcb7e622242d967d385df0fec79c325cd598ced34a41281434332631c3976a0999154ef115942cdb9f99deee1e286948ca9d7ee625ec8a222ebf41ce3ba76a475a2cd9440c02d51a05380abc2489d7695daf655a58ea0df04ed1d51f6dd75b3ac5e298a134e1bd599321e02917d09c513326f66fb1a5725cd23c413095281ca7709c2d18be95b08d4265cb895c7ad0e5bc7105b8db96bde4ea487e93f9e9ad3b8189e1b4ed1612c3c7e13c55fe7065b88d54c1c7b728c34ab48cbb65ef90682f12f2d7a8fd57aa9e425a13a7687bc802d1ce22f387c31d9971a3435b6a06cca254dc5e1c6a9b36f8e37963b9cd8512163ee79412735351b9907b0ece5da0bb9dda4d75425d692896b4aa91abd7c07205656e2d18020c9b52e032a54fa37fec341a51efda8292e283cfbb8c0ea1b0e7501beb8c8c78528064eb9fb4088b4fdbbf68063aa10dfc608ba41ab2455fe8da9d0f3369c25198886c753b44bb614bebde004b842cce5ea52d18db8243c933336beaea4d121f6b007754dede3d28c3053a94627ed967ce3d043c15c7d1520572571685ad809e84765ecf9e654d01e94d6d05bb25677f4122eec866fa1cf6f08179c8bc1268288b459b9fd6a2ffa852b7cee2c2681b50d0154bae290ddea9b3372e8964c6c079b6438795ba06986a2e615c99592479e0123f1e4cc2da3668996893422ed2f40165f88fd074b7b9291b7e69e8560f81d6856da69b9e4f523c9cb8226b062b80a20b6028e38d422e85c67b923fb714d145f2beeabc279cf86847e75a88abd8953807e561a5b6c6737c04222bfead8a66b463927403c9c76784305982c217f4dd116818a679801196af1b3c9754f5568eefe816c1c965390b5894a8c176ce1ecf6ef773da613e0d46da343dcd8139db62a74b46a01133cdfd66910bcfd81248a3c6f2f16cc37de30278bd4ccc83f0c9b983739e7b96da5b89d7d852aa1d6a167e528d3271bf9e8667f3522b465b615e4749e6e5d9bc7fffb9cf44a4ebf4d9311ac0c22ce888f059a206c65ba7cbb67d85552a4485ec604463123b131dce9e11ff0f9df62a66cb55d31f16d4ea1c24e3bf0b1328c0710dc9b5298fd30cbda91ec6aa9ad0213256033fe2a4ccca1442af29d84da9a382f735aba94dc84d6162aa9b94628c308e008206fe34ea3c37e6c843316fffc8db087093f88e1b601392bffdb9061d22ef129724083fcd34cf3859514739ffcc510b2ce9572120a105810d589a8b3af7f36eb5dd8b45c8c31266a9a162517a4295ed4caff6c18459b80dc554b527af323fc63b584c415174d613b4569f267d968676c342ea535a5c00edb31b520cdf14b6da95bcd4c2b653f5a297e5ddf7ba4a4c42e24f9b27be1630a8747db24a5d39b89bbd287cd47f384d72b399e8fec669fd4fc1aca7781d722d79371b09cb88142352ae464c5fa918d9f3069140328bbf9161e74cc4a08f9da72e8c0b4b50aec896130c7108e15db6ce26c56e96bfe67f4b4034adf31a", 0x1000}, {&(0x7f00000069c0)="db0229df1bd43f5e898fa0d90baa61a685db8aadd481d9f36836eaa067c82c6a09dbc9a92affd03c92c199ae76f803", 0x2f}, {&(0x7f0000006a00)="968327acb8c03f64d4c1c062393afbb8fc5da861", 0x14}, {&(0x7f0000006a40)="39b1afd2b460581953534a5975f71e8f671e24729f516eebfce2a948b320f95b60c9b319ed820642737ab8479bb2fb062ebf89a6c3138bcaf1c6bfb7cdf717980d725e27eaae52567ba20368cda879efe6ee507d842d22147205dc50d21b895a88bc83d9f43f4f0c0b1bc8f8ea6f6d859823b988a4584b96157a8bda6a8ae7e0523a69f445a163f633bb8fa7471eee7edb851e9f", 0x94}, {&(0x7f0000006b00)="f072591e72a34b5d17c8da9fefe6ebff0576d6f1302a6a4796cddcb6accc529000408531c3a76f6fa4e33b734ec19f0cad60585324a1c1a0a2eda2dced287800b884eb27a4fee8a4493c55017551e4504ec9e6dcd2ea70dd0648eb298283b5add5e9be305349df0fc47f47798d8b777bea24914a074be4da8e3fe3ff772016c203b5e8", 0x83}, {&(0x7f0000006bc0)="04f7a09665520eaed738372e2d51a8118e2869ef5958ce790015c6402d81d56a8bc4932a36ff57da924be51c38ffbe831f02448164947ec9f0305fae162e3e60c1172fcc713319409693cbb6d45657926708d6097f7e0832ad4d1560c043782b2936a8dde5640bfd7a6bffecb5a10971f101aa233c8dc350458e161285c76ebcfdf9843bb048d5f3006a", 0x8a}, {&(0x7f0000006c80)="50d8bdf08d406664015d061794748228214f6ae20504bf4ab135e51ac443992984f72ca4be30518bb490c1ee1843c96924db38c4134ee83a028506026c0649c51db3638f498b9601f59113f813dd5a", 0x4f}, {&(0x7f0000006d00)="9a8184ea7750cd863851dc7244807d17d29420447173614ce2bb527d1304ad1e46aa6e6a2f18eea9d8c79c9e8d63bc37b07d6c2d8b36cd1b3b19e11300d75750784e21ea029ed050d230222a5cc3542e8e2acb2867ebf76290158e04e279e061a2ddb33bf5303749df220a83b3f86fa4357e517e4df1e4d36aaf8290ae5f1c0a778bc2699fbd996c8a39ef", 0x8b}, {&(0x7f0000006dc0)="08df2a262f6468668b281e88455cc6ab6d6e00888a0e1d8164", 0x19}], 0x9}, 0x401}, {{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000006ec0)="728c2dcd031515dc20b2a022f4464a16fdea3df69d55249f8f4a210bbfd7679e2878d3558d30b0dabd2404ee821385116bba7ffa3224e54bff58116bfa2643efd407d90c4d89f3de5f6838c1fec1a6116635f1dc7c13fd89b34c4561f6e11851c62dfd99d8c8521df7754325864139037fe4c123ebee69b3d566284ee0e64c5b0c0b061721d87f2189b507ba1f54c7a9828cab1f008b67abf9dda942c0565469d62c2053067f060ce88d179e0e9def4b6fe07983d90bffb2952c812c467c6cf31ff5a85760a125bf6b69cffaa82d1ee8e4a00093aaa3e6b0bdff082d98a0f5b2", 0xe0}, {&(0x7f0000006fc0)="126ca0ff30ee11ee726befb95a9a68bd65bb696e6195c56af18e02cc0b73b2002d69a2024a1fe6544e562e65ba51a5a56e6397e1cbb0770a328afc1c54967bf36fa3ea6a8560d3c34c35f57f45838d83d0d0f9309d905e2d75e083bda84df97dd03fc03af8d1c6c7ce68f4ab7e9f1dddcd0db7a3c92eb041f6b18c010d756893f7f3108780b2d49baf43fbe6", 0x8c}, {&(0x7f0000007080)="63e2b49d0ceb467c6c6fc945728a8e347582120432321dfa426013f43535950e900c198ddfc9e6a7686b4a68e05daa781dbe171369c2c0316843c34540cbbaa3b259a5e2f14a8c66a4e9322fe160bed12c5b3e2c8912b7434bc7d6b4e79b0b0d9e801ffc40b32327a18078155aa91eb1bb3bad8bb6e788", 0x77}, {&(0x7f0000007100)="7bba8bf85193475e438fca5cf443407d9d3618204691ca4e7a496d50db75270dce413ec23caafbdf507325b6438f8a89cca8adb2ab3678101ee6278f2bcd8182be4c66bb112fe87ea993abfa9e68b2ee736559e8ab0eb5a2591556f649fdcd2efd6a92db2ab271ef73dbcaf20ec05bde0456d41d0acdeae0e32294c37bced335", 0x80}, {&(0x7f0000007180)="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", 0x1000}], 0x5}, 0x6}], 0x7, 0x0) pread64(r1, &(0x7f00000003c0), 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x27d, 0x0) 00:57:53 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x20000) ioctl$KVM_SMI(r0, 0xaeb7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0xffffffb9, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000340)={0x7b, 0x0, [0x20000003b]}) 00:57:54 executing program 3: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090b0000fff8000000000000000100140000000000030006000000000002000000e0000001000000000000000002000100000000000000000200000000030005000000000002000000e00000010000000000000000"], 0x58}}, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000140)=""/87) 00:57:54 executing program 0: socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40042409, 0xffffffffffffffff) r3 = dup2(r2, r0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 00:57:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x1950, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:57:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80100, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x7, 0x4, 0x4, 0x20, 0x0, r0, 0x0, [0x305f, 0x5f, 0xa]}, 0xfffffffffffffcc2) 00:57:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="92e1"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x400000, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:57:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 00:57:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0xfbf, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x73, @multicast1, 0x4e20, 0x1, 'lc\x00', 0x9, 0x3, 0x59}, 0x2c) 00:57:54 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x40000000000d2, &(0x7f0000000000), 0x3) 00:57:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) [ 258.497748] IPVS: set_ctl: invalid protocol: 115 224.0.0.1:20000 00:57:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x40080) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000100)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x600000000000000, [0x268], [0xc2]}) 00:57:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x68, r2, 0x2ff, 0x0, 0x0, {{0x1, 0x0, 0x3a1c}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\n\x00'}}}}, 0x303}}, 0x0) [ 258.572595] IPVS: set_ctl: invalid protocol: 115 224.0.0.1:20000 00:57:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 00:57:54 executing program 2: pkey_mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x2) modify_ldt$read(0x0, &(0x7f0000000000)=""/239, 0xef) write$evdev(r0, &(0x7f0000001fdc)=[{}, {{0x77359400}}], 0x11a) 00:57:55 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="98f6992060c0ed149d2ad0222e53a8bf59680cce9e6c7121410d81f7490089ef62f038ed7d7bef1884ee49ddaf5953fe1df5b669af5bde184f96e54ca1d100e394c88c9abc802aab2ae38bef0f4353260e488e08c1cc1e9a4ac7db1615fcdf39ec95a13aee30262b993584b1385e4036185cd5862aa081f830f083b9c95aec384f133ea8e811ca14ebf6d681a9dc7c4a7f405d57baf258b6c3ce21d8b41a7dd451a0f6c16d2ffa0bb47bec698a66627716deaccb8021941f6e1bc5c5cd980bb597a136cbf3d8604c663aca066e978fbb6467a0e50f8246c4599309c05b6d26e575e6f779890725335482fc5d812e40979354063ffd118ed2c949e66898bb3fcc") ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, {0x2}}) 00:57:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:57:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1, 0x280000) bind$packet(r3, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000580)="5030674c64e32f786e6d94070cb1449c12044aa621140b7858cbd32b6df16f8724dc86df837f201fa6636eecaa74be1d0ce2422017f4a4377e812116d6f26c8701f13ea826f7fc9976e5fcb1b2d69eeeeba55360bea036a51b80fa235cc80e390000fc4ed0ff27266c023ed67994769050d96b1ad1bd48b139eb3f06511f9e30b67c5ad7d7767c96b0f0b9444e6afaa67a2e1a3395ccbe1d4b7c6c1658e5f5c31cef04ca670bf92d8095fa82332a58f85805e54890b90c58e4299d6346f6bda7e70506346fa43ec87ce2cc34356c573c6f77d3987c03b0923f3edbc37a6a1730babcfde5d0d480e002f0ab3d99c0af2e00") r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f0000000100)="2f40373e4c00ac2c01c1fa9c0d6a639bf83cf5b9f1cc9d9a0bad5962da29847f1795f1596da95a0148e0172644f81643", 0x30) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000180)=0x0) mq_notify(r3, &(0x7f00000001c0)={0x0, 0x36, 0x2, @tid=r5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:57:55 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0xff, 0x40083) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000400)={@loopback, @broadcast, @remote}, &(0x7f0000000440)=0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x300, 0x2, 0x1c}, 0x24) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'sit0\x00', {0x2, 0x7, @multicast1}}) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) 00:57:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)=ANY=[@ANYBLOB="7b3ebf1470b7051b4fa8d27317a4122ee5e0ba1cbbc3d271fd2719009c65fd95150a5c64000adca2"], 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xfffffffffffffffd) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:57:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:57:55 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x10000000003) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000003c0)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7, 0x1, 0x15827b5d, 0x6}, {0x7f, 0x8, 0xfffffffffffffffe, 0x9}]}, 0x10) setsockopt$inet6_mreq(r0, 0x29, 0x400000000000001b, &(0x7f00000001c0)={@remote}, 0x14) close(r0) 00:57:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ab553fec94248c32e27d04000000288a", 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000180)="9e", 0x1, 0xfffffffffffffffc, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) write$binfmt_elf32(r1, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "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"}, 0x1000) 00:57:55 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = socket(0x840000000005, 0x3, 0xf2) sendmsg$rds(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)=""/23, 0x17}, {&(0x7f00000000c0)=""/117, 0x75}], 0x2, &(0x7f0000001580)}, 0x0) 00:57:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2, 0x9, 0xdb93, 0x2}, {0x1, 0x0, 0x401, 0x1f}, {0x7, 0x101, 0x5, 0x3}]}) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='-\a\xfc\xb0\xcf\xa0=\x91\xda\xa0P\xae\xab\x9d\x1e') r2 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc0000000051894dd65b2f", 0x2e}], 0x1, 0x0, 0x349}, 0x0) 00:57:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:57:55 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, 0x0) 00:57:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 00:57:55 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x800000000009) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000000000a661459f010000000000000047af4c4819e4477d9212638a5ca2f150374256dad73963f5d59486500d99544c76520c378f60b125aa2d782f786d85e97e743dfd5e2d869d7f597c21b6c2ebf8ee0a7641414ae02d475c7569d90e758ab31bef15194c5375d598cec84d2f2d83b57652bb7f0d82c6810db5a8d68e3f062761f83e45ecb1ef01c243b592a8e37341c0ea90cbfd0d51c9e99793e729efa3f35f852ef2aff5ddc29b48af660db57d0076a82032c397b07207eea3cd"], 0x0, 0x0) socketpair$unix(0x1, 0x10000000003, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x523, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) 00:57:55 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400243, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000100)={0x8001001, 0x9, 0x1}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32]]], 0x8) accept4$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c, 0x800) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)="01", 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r1}, 0x0, 0xfffffffffffffd60, &(0x7f00000001c0)={&(0x7f0000000340)={'crct10dif\x00'}}) write$FUSE_INIT(r0, &(0x7f00000002c0)={0x50, 0x0, 0x3, {0x7, 0x1c, 0xfffffffffffffffa, 0x1, 0xfc4, 0x6, 0x3ff, 0x6}}, 0x50) 00:57:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100000000, 0x400) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x4}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000000180)="a8ab4670fcaaa8ef5ae4f863401a56d155fc8cd57d3e583a7abee4c9f8b7cfba0417229a80cd041baf7b20460509a9eabc6ddb1d4881308f4656929b73b336ee0467b3164bdd707e19dd3755747512e8e551257b2c9db6ae6d", 0x59}, {&(0x7f0000000200)="cec00d3f1f64f42724d27da137c24d8d1857a0426851986c004e113e9204be9fdaa8c786c9816c066d43684512ae7ae9108340d63f58c26fcb1fe4b9b94ddabb1c7c771f634e2b368949466318e7d01304f550d77edad056", 0x58}, {&(0x7f0000000280)="f6d50c98d4ae9bb0a90e8a822f2e855606e8399a98f5b9cb785cff133b326530666fd6ef18efd31d4d0b91a0", 0x2c}], 0x4, &(0x7f0000000300)="171b970196852db09c6559d68f7202147c444b468cc68f8b302e2e2ca3f1f3dc0503f1aedf86c9777de14961eaa12151fdc905e04ab1a2876a45851d617e670cf5e36d77e535f6f1f771a9a97149dfd128c715a22f3d2ce2ead6823f1a90ee2e3c56e69c939a76ab369a9a5011d53ba68771480b9bac9e4fe2012043e301b54eb340fed7d8b870c59dada809c2fcd9e9efcc20844887ee", 0x97, 0x44}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 00:57:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local, @dev}}}}}}, 0x0) r0 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) 00:57:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 00:57:56 executing program 3: syz_emit_ethernet(0x20d, &(0x7f0000000140)=ANY=[@ANYBLOB="0180c200000000000000000008060001080006040001aaaaaaaaaa00ac141400eb5de09d9520ac141400981d14e873999ca3fc91c459b6f19466b8d17b7b80f7c951699c5c6f7cb598d2fe9038d053e1e00a4cbb7e2a006b69ab4bb60270a4de8ef6c1215aefc97225c8cf90882bc9"], 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @random="994506ead491", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev={0xac, 0x14, 0x14, 0x27}, @dev={[], 0x24}, @dev={0xac, 0x14, 0x14, 0x12}}}}}, &(0x7f0000000040)={0x1, 0x3, [0x10c, 0xb04, 0xc14, 0x31a]}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x1, 0x10000, 0x5, 0xffff, 0xffff, 0x100}) 00:57:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x105001, 0x0) accept$alg(r2, 0x0, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000001c0), 0x4) getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), 0xc) getsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f0000000200)=""/97, &(0x7f0000000280)=0x61) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000020]}}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x117, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, r3, 0x30, 0x1, @in6={0xa, 0x4e22, 0x93, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0xa0) 00:57:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x80000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2a) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x7, @ipv4={[], [], @multicast2}, 0x1}}, 0x8, 0x9, 0x7fff, 0x9}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r3, 0x17, "1cecfe760eb0ec37c9dcc7bb836b33b582a2598a8e90a8"}, &(0x7f00000002c0)=0x1f) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000180), 0x0, 0x0, 0x8) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x4206, r4) rt_tgsigqueueinfo(r4, r4, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffffffffffc58e}) ptrace(0x4208, r4) 00:57:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 260.325764] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:57:56 executing program 2: unshare(0x20400) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000000)) close(r0) recvfrom$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:56 executing program 3: timer_create(0x3, &(0x7f0000000140)={0x0, 0x16, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r0, &(0x7f00000001c0)) socketpair(0x2, 0x4000a, 0x0, &(0x7f0000000040)) timer_create(0x7, &(0x7f0000000000)={0x0, 0xa, 0x2}, &(0x7f0000000080)=0x0) timer_settime(r1, 0x1, &(0x7f00000000c0)={{}, {0x77359400}}, &(0x7f0000000100)) 00:57:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x0, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:56 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x101000, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000280)=0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x100000000000000, 0x7fffffff, 0x1, 0x4, 0x877, 0x5, 0x8, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x6, 0x8, 0x9, 0x3ff, 0x6}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000180)={0x1, 0x4, 0x2, 0x5, 0x0, 0x7, 0x8, 0x8, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x7d, &(0x7f0000c7df60)={r2, @in6, 0x0, 0x2, 0x3}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3, 0x8a, 0x8, 0x2, 0x4, 0x2}, 0x14) 00:57:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000040)=0xfffffffffffffe67) 00:57:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='9'}], 0x100000000000003c, 0x881806) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffff9c, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x5}, 0x28, 0x1) read(r2, &(0x7f0000000200)=""/30, 0xfffffe80) 00:57:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x0, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x100f, 0x2) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='eth1\\\x00', 0xfffffffffffffff9) keyctl$search(0xa, r2, &(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, r3) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000040)={0x800, 0xffff, 0x4, 0x1, 0x7}) syz_kvm_setup_cpu$x86(r1, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) 00:57:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x0, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:57 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000380)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000640)={0x1, 0x0, [{0x0, 0xffffffffffffff51, &(0x7f0000000a00)=""/222}]}) 00:57:57 executing program 1: r0 = socket$inet(0x2, 0x7fffc, 0x0) close(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}], 0x10) sendto$inet(r1, &(0x7f0000000340)="12", 0x1, 0x0, 0x0, 0x0) 00:57:57 executing program 3: r0 = getpgrp(0x0) r1 = gettid() r2 = socket(0xf, 0x29d711d975c16207, 0x5) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x1}) 00:57:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x0, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x101002, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000200)=0xfe, 0x4) write(r0, &(0x7f000054bfba)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f0000000280)='net/wireless\x00') r3 = syz_open_pts(r0, 0x2) r4 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x8) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f00000001c0)) prctl$PR_GET_SECUREBITS(0x1b) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000180)="10", 0x1}], 0x1) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000140)=0x5, 0x4) ioctl$TCFLSH(r0, 0x540b, 0xffffffffffffff80) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000000)) 00:57:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x4) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) clone(0x8000, &(0x7f0000000280)="dac5a927cbf551aecce5c5416ad9f4dcdd2d37767cc922a1813caa4f04cc72bb88753b7bb2eeba4f94577c1428154db5e04ba970b84b5dcac5441ce79e04ddcd830da30fbadcf29bdf5a5f22dcdefdaac95d0ab97badd6c48b3adf7888f858b4b3b20c0e5a0bf895679d71a252980d305ab50f2279f0fb03b709068664a579c51cac1fef342fb29cb0b3285c87096e35bee3edfda2d2b4df287e201bb5ff1b693bfe1b01f1de3f52c848cbb22a53997ec0bc095c1207ce55e06e9583101877f76691b65bef1b0b1e072a91914ddc21bd8af8caedb14b00d868e940a643499785c0a933d111b0be9d026697ecf8f7a31b77d52323339e", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000380)="ac6aec8ed3fb36e00486e7a80f0ee02e71a014d8c1e069d464ceaab5da6d2cb406965e7b6925be7aef345d5a40a223ff7e23babb2a89d6fb1d531c8dac91d5d9604e3b58444c214b833233fb2048fded99fb166a65794daa12c3e9") 00:57:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x747443, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f00000000c0)=""/99) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto$inet(r0, &(0x7f0000000080)="954aa35a41af746f60771d4f876da4e3d93c9a78a9", 0x15, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r4 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setgroups(0x4, &(0x7f00000003c0)=[r2, r3, r4, r5]) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) 00:57:57 executing program 4: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) shutdown(r1, 0x1) readv(r2, &(0x7f0000001680)=[{&(0x7f0000000180)=""/85, 0x55}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYPTR], 0x8) 00:57:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x0, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:57 executing program 2: syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x7, 0x8000) unshare(0x20040600) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x0, 0x0, 0x10000}) 00:57:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) fcntl$setsig(r0, 0xa, 0x16) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20008005, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000000c0)={@loopback, @dev}, &(0x7f0000000100)=0xc) mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) 00:57:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x0, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x4) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) clone(0x8000, &(0x7f0000000280)="dac5a927cbf551aecce5c5416ad9f4dcdd2d37767cc922a1813caa4f04cc72bb88753b7bb2eeba4f94577c1428154db5e04ba970b84b5dcac5441ce79e04ddcd830da30fbadcf29bdf5a5f22dcdefdaac95d0ab97badd6c48b3adf7888f858b4b3b20c0e5a0bf895679d71a252980d305ab50f2279f0fb03b709068664a579c51cac1fef342fb29cb0b3285c87096e35bee3edfda2d2b4df287e201bb5ff1b693bfe1b01f1de3f52c848cbb22a53997ec0bc095c1207ce55e06e9583101877f76691b65bef1b0b1e072a91914ddc21bd8af8caedb14b00d868e940a643499785c0a933d111b0be9d026697ecf8f7a31b77d52323339e", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000380)="ac6aec8ed3fb36e00486e7a80f0ee02e71a014d8c1e069d464ceaab5da6d2cb406965e7b6925be7aef345d5a40a223ff7e23babb2a89d6fb1d531c8dac91d5d9604e3b58444c214b833233fb2048fded99fb166a65794daa12c3e9") 00:57:58 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x1}}, 0x20) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ntfs\x00', 0x0, 0x0) 00:57:58 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x108, r2, 0x502, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x20}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x24}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9cd}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb83}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40a3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}]}, 0x108}, 0x1, 0x0, 0x0, 0x48001}, 0x8010) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) 00:57:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x4) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) clone(0x8000, &(0x7f0000000280)="dac5a927cbf551aecce5c5416ad9f4dcdd2d37767cc922a1813caa4f04cc72bb88753b7bb2eeba4f94577c1428154db5e04ba970b84b5dcac5441ce79e04ddcd830da30fbadcf29bdf5a5f22dcdefdaac95d0ab97badd6c48b3adf7888f858b4b3b20c0e5a0bf895679d71a252980d305ab50f2279f0fb03b709068664a579c51cac1fef342fb29cb0b3285c87096e35bee3edfda2d2b4df287e201bb5ff1b693bfe1b01f1de3f52c848cbb22a53997ec0bc095c1207ce55e06e9583101877f76691b65bef1b0b1e072a91914ddc21bd8af8caedb14b00d868e940a643499785c0a933d111b0be9d026697ecf8f7a31b77d52323339e", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000380)="ac6aec8ed3fb36e00486e7a80f0ee02e71a014d8c1e069d464ceaab5da6d2cb406965e7b6925be7aef345d5a40a223ff7e23babb2a89d6fb1d531c8dac91d5d9604e3b58444c214b833233fb2048fded99fb166a65794daa12c3e9") 00:57:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:58 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0xfffffffffffffffd, 0x4, 0x8, 0x5}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080), 0x4) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'lapb0\x00'}) renameat2(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x3) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x800, 0x1) write$evdev(r0, &(0x7f0000000200)=[{{}, 0x0, 0x7, 0x40}, {{0x0, 0x2710}, 0x3, 0xef, 0x8}], 0x30) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x1, 0x2, 0x3, 0x4, "59d5af8452966d86dae709a799be3e478085ac8b95a83c3aee5c7c907e3baf801b0b6926841ca039b0098dc3b2fc8514d3be96ff9c5e9244ceb0bb4376c374c6392947921b4a252e05d6cce92c"}, 0x5d) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f00000002c0)=0x90d3) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000300)={0x80000001, 0x0, 0x10003, 0xfffffffffffffff7}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000340)={0x80000001, r1}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x115d, 0x2, 0xfff, 0x7f, 0x7}, &(0x7f00000003c0)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r2, 0xca, "0d2a350f488bab1fbb3df25a9cff8a346cb126fd74cf05a0c53ab9501a6e39f56b84adda093ceb03da2658adf74898c67dbde09b35072754c17d004b380390e399efc40c1015996e9139feea334d5031fbfdd2e8b43d34713cd750de385529b108a33af3bac634fd21a7f93428f89961ef7f65f3dd24d5f0c3b0076b35bf26e02e60ee200ff1d8f73fcc236815f4c455f00f2092b85f1cd5b9cb1b775504d66b3b5f5bf17e63f3e2c5b1a9468696c6d29415dc3c5482ed620591815feca3a7bcb5872a630f2f08d43e77"}, &(0x7f0000000500)=0xd2) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000580)=[{{0x77359400}, 0x0, 0x7, 0x8}, {{0x77359400}, 0x3, 0x2, 0x8001}, {{r4, r5/1000+30000}, 0x15, 0x5, 0x6}, {{0x0, 0x7530}, 0x1, 0x4182356f, 0x4}], 0x60) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000600)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000640)={0x80000001, r1, 0x10001, 0x8000}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000680)) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000700)={0x0, 0x7fff, 0x100, [], &(0x7f00000006c0)=0xb3f6}) r6 = syz_open_dev$cec(&(0x7f0000000740)='/dev/cec#\x00', 0x2, 0x2) setsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000780)={0x0, 0x2}, 0x8) getpeername(r6, &(0x7f00000007c0)=@pppoe, &(0x7f0000000840)=0x80) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000a40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xd0, r7, 0x101, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x40}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1820}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0xc0}, 0x8080) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vsock\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f0000000ac0)={r3, 0x8, 0x100000001, 0x400}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) 00:57:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) 00:57:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x4) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) clone(0x8000, &(0x7f0000000280)="dac5a927cbf551aecce5c5416ad9f4dcdd2d37767cc922a1813caa4f04cc72bb88753b7bb2eeba4f94577c1428154db5e04ba970b84b5dcac5441ce79e04ddcd830da30fbadcf29bdf5a5f22dcdefdaac95d0ab97badd6c48b3adf7888f858b4b3b20c0e5a0bf895679d71a252980d305ab50f2279f0fb03b709068664a579c51cac1fef342fb29cb0b3285c87096e35bee3edfda2d2b4df287e201bb5ff1b693bfe1b01f1de3f52c848cbb22a53997ec0bc095c1207ce55e06e9583101877f76691b65bef1b0b1e072a91914ddc21bd8af8caedb14b00d868e940a643499785c0a933d111b0be9d026697ecf8f7a31b77d52323339e", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000380)="ac6aec8ed3fb36e00486e7a80f0ee02e71a014d8c1e069d464ceaab5da6d2cb406965e7b6925be7aef345d5a40a223ff7e23babb2a89d6fb1d531c8dac91d5d9604e3b58444c214b833233fb2048fded99fb166a65794daa12c3e9") 00:57:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:57:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x28, 0x5, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:57:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000600)="0adc1f121e0d3f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x58, r2, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'dip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) 00:57:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x28, 0x5, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:57:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) 00:57:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x4) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) [ 263.818740] IPVS: ftp: loaded support on port[0] = 21 [ 264.027178] chnl_net:caif_netlink_parms(): no params data found [ 264.118246] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.124821] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.133063] device bridge_slave_0 entered promiscuous mode [ 264.142473] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.148953] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.156669] device bridge_slave_1 entered promiscuous mode [ 264.177306] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.187146] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.206602] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.214249] team0: Port device team_slave_0 added [ 264.219925] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.227954] team0: Port device team_slave_1 added [ 264.233549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 264.241196] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 264.285308] device hsr_slave_0 entered promiscuous mode [ 264.322372] device hsr_slave_1 entered promiscuous mode [ 264.392543] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 264.399747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 264.417394] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.423898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.430662] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.437179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.483493] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 264.489600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.499189] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.509656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.518564] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.526078] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.534606] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 264.549378] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 264.555556] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.566915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.575053] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.581469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.605666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.615269] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.621838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.630535] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.639604] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 264.653753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.667496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.684060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 264.695271] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 264.701388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 264.710072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.730967] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 264.744800] 8021q: adding VLAN 0 to HW filter on device batadv0 00:58:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x28, 0x5, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:58:00 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa01, &(0x7f0000000000)={{&(0x7f0000404000/0x600000)=nil, 0x60001e}}) 00:58:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x40000) 00:58:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) 00:58:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r0, r1, &(0x7f00000000c0)=0x4b, 0x5a) 00:58:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x0, @u64}]}, 0x20}}, 0x0) 00:58:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 00:58:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) getsockname(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) readv(0xffffffffffffffff, 0x0, 0xffffffffffffffce) r2 = dup3(r0, r1, 0x0) mknod(0x0, 0x0, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) getpid() getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000100)=0x10) 00:58:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) 00:58:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x0, @u64}]}, 0x20}}, 0x0) 00:58:01 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x1ff, 0x0, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffffffffff7]}}}) 00:58:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:01 executing program 4: r0 = socket$kcm(0xa, 0x100000002, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002b00)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x0) 00:58:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x0, @u64}]}, 0x20}}, 0x0) 00:58:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:01 executing program 4: inotify_init1(0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) socket$vsock_dgram(0x28, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 00:58:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) close(r10) 00:58:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x1000000000000, 0x0, 0x10000010003, 0x9e9f}) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:02 executing program 0: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) syz_genetlink_get_family_id$team(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 00:58:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) close(r10) 00:58:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x1, 0xb7, &(0x7f0000000180)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) 00:58:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) [ 266.466067] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:58:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/current\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYRES16=r0, @ANYRESHEX], 0x2d}, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) preadv(r0, &(0x7f00000017c0), 0x1ea, 0x400000000000) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 00:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) close(r10) 00:58:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:02 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:58:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) 00:58:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:03 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0}, {}], 0x2, 0x91) 00:58:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) 00:58:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/current\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYRES16=r0, @ANYRESHEX], 0x2d}, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) preadv(r0, &(0x7f00000017c0), 0x1ea, 0x400000000000) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 00:58:03 executing program 1: io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) 00:58:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) 00:58:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) 00:58:03 executing program 1: io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) 00:58:03 executing program 5: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) 00:58:06 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)="0bd2430f000319", 0x7}], 0x1) 00:58:06 executing program 5: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="c8d02a23af27c4103c8ef91b4e0e6906"}}}, 0x0) 00:58:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) 00:58:06 executing program 1: io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) 00:58:06 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000404000/0x600000)=nil, 0x600000}}) 00:58:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rtc0\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x40001, 0x0) request_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000340)='mime_type\':lo&vboxnet0,}\x00', 0x0) r1 = dup(0xffffffffffffff9c) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x1107ff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0xdf83) clone(0x2102801ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r2, 0xc0386106, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) socket$inet6(0xa, 0x0, 0x0) 00:58:06 executing program 5: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) 00:58:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0}]) 00:58:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:09 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 00:58:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 00:58:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) [ 273.422253] dns_resolver: Unsupported server list version (0) [ 273.466310] dns_resolver: Unsupported server list version (0) 00:58:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) 00:58:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) [ 273.710673] kernel msg: ebtables bug: please report to author: Wrong nr of counters 00:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:12 executing program 4: 00:58:12 executing program 0: 00:58:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:12 executing program 4: 00:58:12 executing program 0: 00:58:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:12 executing program 0: 00:58:12 executing program 4: 00:58:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00'}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xfffffffffffffeae, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0x0, @remote, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:13 executing program 0: 00:58:13 executing program 4: 00:58:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00'}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f0000000100)) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:13 executing program 0: 00:58:13 executing program 4: 00:58:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00'}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f0000000100)) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:13 executing program 0: 00:58:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:13 executing program 4: 00:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f0000000100)) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:13 executing program 0: 00:58:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:13 executing program 4: 00:58:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000100)={'lo\x00\x1e\x00', {0x2, 0x0, @empty}}) 00:58:14 executing program 0: 00:58:14 executing program 4: 00:58:14 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:14 executing program 0: 00:58:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 00:58:14 executing program 4: 00:58:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:14 executing program 0: 00:58:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:14 executing program 4: 00:58:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r4, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r4, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r5, r6, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 00:58:14 executing program 4: 00:58:14 executing program 0: 00:58:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\xd8\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 00:58:15 executing program 4: 00:58:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r4, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r4, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r5, r6, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:15 executing program 0: 00:58:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x54, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:15 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) creat(&(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 00:58:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000280)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d00006f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0x0, 0x20004000, &(0x7f0000000180)=@abs, 0x6e) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 00:58:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000000)=0xfffffffffffffdd1) 00:58:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r4, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r4, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r5, r6, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:15 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:15 executing program 0: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) dup3(r0, r1, 0x0) [ 279.766305] device lo entered promiscuous mode [ 279.819124] device lo left promiscuous mode 00:58:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:15 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) [ 279.874303] device lo entered promiscuous mode 00:58:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x0) 00:58:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x0, 0x0) 00:58:16 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:16 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) [ 280.302231] device lo left promiscuous mode [ 280.360906] device lo entered promiscuous mode 00:58:16 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000002c0)={{0x0, 0x4}}) 00:58:16 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:16 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:16 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f00000cf000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 00:58:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x0, 0x4, @local, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:17 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000424, 0x1) write(r1, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) socket$inet(0x2, 0x8080f, 0x400) syz_open_procfs(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) 00:58:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r8 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r8) [ 281.336132] device lo entered promiscuous mode 00:58:17 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:17 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x10000) [ 281.382518] device lo left promiscuous mode [ 281.393454] device lo entered promiscuous mode 00:58:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r8 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r8) 00:58:17 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:17 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x10000) [ 281.567602] device lo left promiscuous mode 00:58:17 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, 0x0) 00:58:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xffff, @remote, 0x6}, @in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r8 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r8) 00:58:17 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x0, 0x1}) 00:58:18 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') linkat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) [ 282.363102] device lo entered promiscuous mode [ 282.370791] device lo left promiscuous mode [ 282.378544] device lo entered promiscuous mode 00:58:18 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:18 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) [ 282.484301] device lo left promiscuous mode 00:58:18 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 00:58:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:18 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:18 executing program 0: add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 00:58:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) [ 283.220905] device lo entered promiscuous mode 00:58:19 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) 00:58:19 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:19 executing program 0: syz_open_dev$midi(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, 0x0) inotify_init1(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) socket$vsock_dgram(0x28, 0x2, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:58:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:19 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x3, 0x0) 00:58:19 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9) 00:58:19 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:19 executing program 5: socket(0x11, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) [ 283.972492] device lo left promiscuous mode [ 284.007947] device lo entered promiscuous mode 00:58:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:58:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, 0x0) 00:58:20 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:20 executing program 5: socket(0x11, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) [ 284.378728] device lo left promiscuous mode 00:58:20 executing program 4: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x50510b4e) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 284.402707] device lo entered promiscuous mode 00:58:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:20 executing program 5: socket(0x11, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:20 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x1ff, 0x1, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffffffffff7]}}}) syz_open_dev$admmidi(0x0, 0x0, 0x0) [ 284.687994] device lo left promiscuous mode 00:58:20 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000200)) [ 284.752014] device lo entered promiscuous mode [ 284.784225] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 284.798759] CPU: 1 PID: 11958 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 284.805996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.815476] Call Trace: [ 284.818209] dump_stack+0x173/0x1d0 [ 284.821932] warn_alloc+0x4eb/0x710 [ 284.825640] ? __msan_metadata_ptr_for_load_8+0x10/0x20 00:58:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x1000400000002, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000003c0)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 284.831075] __vmalloc_node_range+0x1f4/0x13a0 [ 284.835732] ? kmem_cache_alloc_trace+0x55d/0xb40 [ 284.840639] vmalloc_user+0xde/0x440 [ 284.844492] ? vb2_vmalloc_alloc+0x19d/0x4a0 [ 284.848967] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 284.854216] vb2_vmalloc_alloc+0x19d/0x4a0 [ 284.858508] __vb2_queue_alloc+0xe74/0x2100 [ 284.862906] ? vb2_common_vm_close+0xc0/0xc0 [ 284.867380] vb2_core_create_bufs+0x761/0xd00 [ 284.871944] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 284.877185] vb2_create_bufs+0x92f/0xdf0 [ 284.881312] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 284.886624] v4l2_m2m_ioctl_create_bufs+0x1bc/0x1d0 [ 284.891703] ? v4l2_m2m_ioctl_reqbufs+0x310/0x310 [ 284.896589] v4l_create_bufs+0x2c0/0x3b0 [ 284.900711] ? v4l_unsubscribe_event+0xc0/0xc0 [ 284.905340] __video_do_ioctl+0x1444/0x1b50 [ 284.909718] ? __video_do_ioctl+0x771/0x1b50 [ 284.914190] video_usercopy+0xe60/0x1830 [ 284.918308] ? video_ioctl2+0xb0/0xb0 [ 284.922190] video_ioctl2+0x9f/0xb0 [ 284.925865] ? video_usercopy+0x1830/0x1830 [ 284.930248] v4l2_ioctl+0x23f/0x270 [ 284.933939] ? v4l2_poll+0x400/0x400 [ 284.937705] do_vfs_ioctl+0xebd/0x2bf0 [ 284.941652] ? security_file_ioctl+0x92/0x200 [ 284.946226] __se_sys_ioctl+0x1da/0x270 [ 284.950283] __x64_sys_ioctl+0x4a/0x70 [ 284.954217] do_syscall_64+0xbc/0xf0 [ 284.958044] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 284.963268] RIP: 0033:0x457e39 [ 284.966510] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.985548] RSP: 002b:00007fe941921c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 284.993315] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 285.000629] RDX: 0000000020000100 RSI: 00000000c100565c RDI: 0000000000000003 [ 285.007942] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 285.015250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9419226d4 [ 285.022568] R13: 00000000004c2810 R14: 00000000004d51d0 R15: 00000000ffffffff [ 285.030087] Mem-Info: [ 285.032662] active_anon:82676 inactive_anon:184 isolated_anon:148 [ 285.032662] active_file:7542 inactive_file:35651 isolated_file:0 [ 285.032662] unevictable:0 dirty:50 writeback:0 unstable:0 [ 285.032662] slab_reclaimable:4307 slab_unreclaimable:13113 [ 285.032662] mapped:58486 shmem:250 pagetables:1045 bounce:0 [ 285.032662] free:909009 free_pcp:724 free_cma:0 [ 285.066436] Node 0 active_anon:332696kB inactive_anon:736kB active_file:30032kB inactive_file:142604kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:233944kB dirty:196kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 212992kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 285.095068] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 285.121159] Node 0 DMA free:15904kB min:212kB low:264kB high:316kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 285.147512] lowmem_reserve[]: 0 2800 3490 3490 [ 285.152278] Node 0 DMA32 free:507168kB min:38380kB low:47972kB high:57564kB active_anon:330684kB inactive_anon:56kB active_file:21268kB inactive_file:138564kB unevictable:0kB writepending:192kB present:3129332kB managed:2872032kB mlocked:0kB kernel_stack:4608kB pagetables:3824kB bounce:0kB free_pcp:1680kB local_pcp:284kB free_cma:0kB [ 285.182242] lowmem_reserve[]: 0 0 690 690 [ 285.186460] Node 0 Normal free:25960kB min:23800kB low:26164kB high:28528kB active_anon:2004kB inactive_anon:688kB active_file:8764kB inactive_file:4064kB unevictable:0kB writepending:28kB present:786432kB managed:706992kB mlocked:0kB kernel_stack:11456kB pagetables:328kB bounce:0kB free_pcp:1352kB local_pcp:848kB free_cma:0kB [ 285.215686] lowmem_reserve[]: 0 0 0 0 [ 285.219568] Node 1 Normal free:3088072kB min:42048kB low:52560kB high:63072kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3141296kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 285.247359] lowmem_reserve[]: 0 0 0 0 [ 285.251243] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 285.264743] Node 0 DMA32: 1840*4kB (UME) 1296*8kB (UME) 831*16kB (UME) 481*32kB (UME) 275*64kB (UME) 98*128kB (UME) 12*256kB (UM) 3*512kB (UME) 0*1024kB 2*2048kB (UM) 103*4096kB (M) = 507152kB [ 285.282326] Node 0 Normal: 2*4kB (ME) 436*8kB (UME) 174*16kB (UME) 107*32kB (UME) 104*64kB (UME) 43*128kB (UM) 8*256kB (UME) 2*512kB (UM) 1*1024kB (M) 0*2048kB 0*4096kB = 25960kB [ 285.298697] Node 1 Normal: 10*4kB (UME) 8*8kB (UM) 4*16kB (UE) 11*32kB (UME) 3*64kB (UM) 6*128kB (UME) 1*256kB (M) 6*512kB (UME) 7*1024kB (UM) 4*2048kB (M) 749*4096kB (M) = 3088072kB [ 285.315384] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 285.324361] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 285.333088] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 285.342070] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 285.350677] 43448 total pagecache pages [ 285.354798] 0 pages in swap cache [ 285.358285] Swap cache stats: add 0, delete 0, find 0/0 [ 285.363771] Free swap = 0kB [ 285.366802] Total swap = 0kB [ 285.369817] 1965979 pages RAM [ 285.373048] 0 pages HighMem/MovableOnly [ 285.377047] 281923 pages reserved [ 285.380508] 0 pages cma reserved [ 285.401978] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 285.415646] CPU: 0 PID: 11970 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 285.422881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.432264] Call Trace: [ 285.434922] dump_stack+0x173/0x1d0 [ 285.438614] warn_alloc+0x4eb/0x710 [ 285.442305] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 285.447730] __vmalloc_node_range+0x1f4/0x13a0 [ 285.452381] ? kmem_cache_alloc_trace+0x55d/0xb40 [ 285.457284] vmalloc_user+0xde/0x440 [ 285.461056] ? vb2_vmalloc_alloc+0x19d/0x4a0 [ 285.465514] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 285.470763] vb2_vmalloc_alloc+0x19d/0x4a0 [ 285.475061] __vb2_queue_alloc+0xe74/0x2100 [ 285.479444] ? vb2_common_vm_close+0xc0/0xc0 [ 285.484016] vb2_core_create_bufs+0x761/0xd00 [ 285.488586] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 285.493832] vb2_create_bufs+0x92f/0xdf0 [ 285.497990] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 285.503246] v4l2_m2m_ioctl_create_bufs+0x1bc/0x1d0 [ 285.508320] ? v4l2_m2m_ioctl_reqbufs+0x310/0x310 [ 285.513208] v4l_create_bufs+0x2c0/0x3b0 [ 285.517327] ? v4l_unsubscribe_event+0xc0/0xc0 [ 285.521952] __video_do_ioctl+0x1444/0x1b50 [ 285.526329] ? __video_do_ioctl+0x771/0x1b50 [ 285.530797] video_usercopy+0xe60/0x1830 [ 285.534913] ? video_ioctl2+0xb0/0xb0 [ 285.538791] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 285.544286] video_ioctl2+0x9f/0xb0 [ 285.547960] ? video_usercopy+0x1830/0x1830 [ 285.552320] v4l2_ioctl+0x23f/0x270 [ 285.555995] ? v4l2_poll+0x400/0x400 [ 285.559763] do_vfs_ioctl+0xebd/0x2bf0 [ 285.563711] ? security_file_ioctl+0x92/0x200 [ 285.568261] __se_sys_ioctl+0x1da/0x270 [ 285.572291] __x64_sys_ioctl+0x4a/0x70 [ 285.576226] do_syscall_64+0xbc/0xf0 [ 285.579995] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 285.585222] RIP: 0033:0x457e39 00:58:21 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) [ 285.588462] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.607405] RSP: 002b:00007fe941900c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 285.615158] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 285.622463] RDX: 0000000020000100 RSI: 00000000c100565c RDI: 0000000000000003 [ 285.630130] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 285.637437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9419016d4 [ 285.644740] R13: 00000000004c2810 R14: 00000000004d51d0 R15: 00000000ffffffff 00:58:21 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x1ff, 0x1, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffffffffff7]}}}) syz_open_dev$admmidi(0x0, 0x0, 0x0) [ 285.865416] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 285.879257] CPU: 0 PID: 11983 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #9 [ 285.886486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.895886] Call Trace: [ 285.898539] dump_stack+0x173/0x1d0 [ 285.902222] warn_alloc+0x4eb/0x710 [ 285.905928] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 285.911355] __vmalloc_node_range+0x1f4/0x13a0 [ 285.916106] ? kmem_cache_alloc_trace+0x55d/0xb40 [ 285.921008] vmalloc_user+0xde/0x440 [ 285.924788] ? vb2_vmalloc_alloc+0x19d/0x4a0 [ 285.929246] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 285.934491] vb2_vmalloc_alloc+0x19d/0x4a0 [ 285.938782] __vb2_queue_alloc+0xe74/0x2100 [ 285.943164] ? vb2_common_vm_close+0xc0/0xc0 [ 285.947639] vb2_core_create_bufs+0x761/0xd00 [ 285.952209] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 285.957452] vb2_create_bufs+0x92f/0xdf0 [ 285.961569] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 285.966977] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 285.972200] v4l2_m2m_ioctl_create_bufs+0x1bc/0x1d0 [ 285.977244] ? v4l2_m2m_ioctl_reqbufs+0x310/0x310 [ 285.982111] v4l_create_bufs+0x2c0/0x3b0 [ 285.986200] ? v4l_unsubscribe_event+0xc0/0xc0 [ 285.990801] __video_do_ioctl+0x1444/0x1b50 [ 285.995146] ? __video_do_ioctl+0x771/0x1b50 [ 285.999586] video_usercopy+0xe60/0x1830 [ 286.003668] ? video_ioctl2+0xb0/0xb0 [ 286.007509] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 286.012911] ? kmem_cache_free+0x880/0x2b70 [ 286.017259] ? putname+0x20e/0x230 [ 286.020816] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 286.026033] video_ioctl2+0x9f/0xb0 [ 286.029678] ? video_usercopy+0x1830/0x1830 [ 286.034022] v4l2_ioctl+0x23f/0x270 [ 286.037666] ? v4l2_poll+0x400/0x400 [ 286.041399] do_vfs_ioctl+0xebd/0x2bf0 [ 286.045320] ? security_file_ioctl+0x92/0x200 [ 286.049837] __se_sys_ioctl+0x1da/0x270 [ 286.053845] __x64_sys_ioctl+0x4a/0x70 [ 286.057759] do_syscall_64+0xbc/0xf0 [ 286.061505] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 286.066713] RIP: 0033:0x457e39 [ 286.069929] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.088843] RSP: 002b:00007fe941921c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.096580] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 286.103888] RDX: 0000000020000100 RSI: 00000000c100565c RDI: 0000000000000003 [ 286.111168] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 286.118451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9419226d4 [ 286.125730] R13: 00000000004c2810 R14: 00000000004d51d0 R15: 00000000ffffffff [ 286.133149] warn_alloc_show_mem: 1 callbacks suppressed [ 286.133157] Mem-Info: [ 286.141038] active_anon:83166 inactive_anon:184 isolated_anon:0 [ 286.141038] active_file:7542 inactive_file:35658 isolated_file:0 [ 286.141038] unevictable:0 dirty:56 writeback:0 unstable:0 [ 286.141038] slab_reclaimable:4307 slab_unreclaimable:13121 [ 286.141038] mapped:58469 shmem:250 pagetables:1010 bounce:0 [ 286.141038] free:909303 free_pcp:921 free_cma:0 [ 286.174702] Node 0 active_anon:332664kB inactive_anon:736kB active_file:30032kB inactive_file:142632kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:233876kB dirty:220kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 227328kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 286.203270] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 286.229147] Node 0 DMA free:15904kB min:212kB low:264kB high:316kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 286.255430] lowmem_reserve[]: 0 2800 3490 3490 [ 286.260091] Node 0 DMA32 free:507148kB min:38380kB low:47972kB high:57564kB active_anon:330660kB inactive_anon:48kB active_file:21268kB inactive_file:138568kB unevictable:0kB writepending:192kB present:3129332kB managed:2872032kB mlocked:0kB kernel_stack:4352kB pagetables:3712kB bounce:0kB free_pcp:2152kB local_pcp:1112kB free_cma:0kB [ 286.290082] lowmem_reserve[]: 0 0 690 690 [ 286.294372] Node 0 Normal free:25960kB min:23800kB low:26164kB high:28528kB active_anon:2004kB inactive_anon:688kB active_file:8764kB inactive_file:4064kB unevictable:0kB writepending:28kB present:786432kB managed:706992kB mlocked:0kB kernel_stack:11456kB pagetables:328kB bounce:0kB free_pcp:1352kB local_pcp:504kB free_cma:0kB [ 286.323604] lowmem_reserve[]: 0 0 0 0 [ 286.327458] Node 1 Normal free:3088072kB min:42048kB low:52560kB high:63072kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3141296kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 286.355193] lowmem_reserve[]: 0 0 0 0 [ 286.359064] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 286.372418] Node 0 DMA32: 1591*4kB (UME) 1296*8kB (UME) 825*16kB (UME) 485*32kB (UME) 289*64kB (UME) 99*128kB (UME) 12*256kB (UM) 3*512kB (UME) 0*1024kB 2*2048kB (UM) 103*4096kB (M) = 507212kB [ 286.389936] Node 0 Normal: 2*4kB (ME) 436*8kB (UME) 174*16kB (UME) 107*32kB (UME) 104*64kB (UME) 43*128kB (UM) 8*256kB (UME) 2*512kB (UM) 1*1024kB (M) 0*2048kB 0*4096kB = 25960kB [ 286.406181] Node 1 Normal: 10*4kB (UME) 8*8kB (UM) 4*16kB (UE) 11*32kB (UME) 3*64kB (UM) 6*128kB (UME) 1*256kB (M) 6*512kB (UME) 7*1024kB (UM) 4*2048kB (M) 749*4096kB (M) = 3088072kB [ 286.422893] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 286.431896] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 286.440524] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 286.449491] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 286.458141] 43449 total pagecache pages [ 286.462227] 0 pages in swap cache [ 286.465710] Swap cache stats: add 0, delete 0, find 0/0 [ 286.471074] Free swap = 0kB [ 286.474167] Total swap = 0kB [ 286.477213] 1965979 pages RAM [ 286.480325] 0 pages HighMem/MovableOnly [ 286.484406] 281923 pages reserved [ 286.487894] 0 pages cma reserved 00:58:23 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:23 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:23 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) 00:58:23 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 00:58:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 00:58:23 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/190, 0xbe}], 0x1) 00:58:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, 0x0) 00:58:23 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:23 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x0, 0x0) 00:58:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e460cdfbef24080000000a9b86dd", 0x0, 0xedf}, 0x28) 00:58:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:26 executing program 4: 00:58:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:26 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:26 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x0, 0x0) 00:58:26 executing program 0: 00:58:26 executing program 0: [ 290.554360] device lo left promiscuous mode 00:58:26 executing program 4: [ 290.575389] device lo entered promiscuous mode 00:58:26 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x0, 0x0) 00:58:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r7 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r6) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r7) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r8 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r8) 00:58:26 executing program 0: 00:58:26 executing program 4: [ 290.863422] device lo left promiscuous mode [ 290.924919] device lo entered promiscuous mode 00:58:29 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 00:58:29 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x0, &(0x7f00000000c0)) 00:58:29 executing program 0: 00:58:29 executing program 4: 00:58:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r7 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r6) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r7) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r8 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r8) [ 293.636315] device lo left promiscuous mode 00:58:29 executing program 0: [ 293.659441] device lo entered promiscuous mode 00:58:29 executing program 4: 00:58:29 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x0, &(0x7f00000000c0)) 00:58:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r7 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r6) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r7) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r8 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r8) 00:58:29 executing program 5: r0 = socket(0x0, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:29 executing program 4: 00:58:30 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 00:58:30 executing program 0: [ 294.105056] device lo left promiscuous mode 00:58:30 executing program 0: 00:58:30 executing program 4: [ 294.130813] device lo entered promiscuous mode 00:58:30 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x0, &(0x7f00000000c0)) 00:58:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:30 executing program 4: 00:58:30 executing program 2: socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) 00:58:30 executing program 5: r0 = socket(0x0, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:30 executing program 0: 00:58:30 executing program 4: 00:58:30 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x1, &(0x7f00000000c0)=[0x0]) [ 294.556062] device lo left promiscuous mode [ 294.595306] device lo entered promiscuous mode 00:58:30 executing program 2: 00:58:30 executing program 0: 00:58:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:30 executing program 5: r0 = socket(0x0, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:30 executing program 4: 00:58:30 executing program 0: 00:58:30 executing program 2: 00:58:31 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x1, &(0x7f00000000c0)=[0x0]) [ 295.028549] device lo left promiscuous mode [ 295.067856] device lo entered promiscuous mode 00:58:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:31 executing program 4: 00:58:31 executing program 2: 00:58:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:58:31 executing program 5: r0 = socket(0x11, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:31 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x1, &(0x7f00000000c0)=[0x0]) 00:58:31 executing program 2: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040efc291177bdfdb7b788e6c0000220180ee090b010000f4eb26ffcd16add75afe000000aca8316aea2699868ae0365459f32ee3b5f72f"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:58:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x19, &(0x7f0000000440), 0x1d1, 0x0, 0xffffffffffffffbc}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 295.425617] device lo left promiscuous mode [ 295.469006] device lo entered promiscuous mode 00:58:31 executing program 5: r0 = socket(0x11, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, 0x0, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:31 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 00:58:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x248) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400218) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, 0x0, 0x0, [{}, {}]}, 0x98) 00:58:31 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) 00:58:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="000fb8e97ead0cad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed88991430f6149d80eb2d48e7dfbb1c7b393dc9d50199fe780906161698abfaf82dc02a07000000000000000e8827a82c8cff1185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c4bb73014643b46185ae0c1f15f1e330e43571f561e312783148a2d2ded573fa18ab82b8429ac5233d04f1d387ccd47be9c4035b341b77ea0828289e1c0fa482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660f3021bf06c9ba57c81b2f23c39c8f352d49b6d1bd77a568e6359386b6b83849bbeb5861ae19c9722931ae3fd806b8c2cc1fac6f14259e2b852582754135704f1f472dd09babbf3948015a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d0449fabc767e6947c0669b2172338c207dfecd0b707dd085836522fc5ff2accb7a298e4a29ec22"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, 0x0, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:32 executing program 4: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, &(0x7f0000000140)=@util={0x25, "ca22ddf66890566c2cd9fad8d077fbbb"}, 0x18) 00:58:32 executing program 5: r0 = socket(0x11, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) 00:58:32 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) 00:58:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='qnx6\x00', 0x0, 0x0) 00:58:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e460cdfbef24080000000a9b86dd", 0x0, 0xedf}, 0x28) close(r0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x11b) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 00:58:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, 0x0, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) [ 296.404823] device lo left promiscuous mode [ 296.435265] device lo entered promiscuous mode 00:58:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r1, 0x0, 0x2, 0x4}}, 0x20) 00:58:32 executing program 5: socket(0x11, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:32 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) 00:58:32 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 00:58:32 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002c00)={&(0x7f0000002b80)=@name={0x1e, 0x2, 0x0, {{}, 0xf000000}}, 0x10, 0x0}, 0x0) 00:58:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) [ 296.691256] device lo left promiscuous mode [ 296.738180] device lo entered promiscuous mode 00:58:32 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x40000) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 00:58:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x20, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) 00:58:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 00:58:33 executing program 5: socket(0x11, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) 00:58:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0xa31, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000140)) 00:58:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 297.210906] device lo left promiscuous mode [ 297.246624] device lo entered promiscuous mode 00:58:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veu\x00\x00\x00\xe4a_\xac\x00', 0x43732e5398416f1a}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="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") close(r0) 00:58:33 executing program 4: syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 297.373299] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.380304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:58:33 executing program 5: socket(0x11, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) [ 297.474939] Invalid option length (1048305) for dns_resolver key [ 297.497988] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 00:58:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(r6, r7, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r9 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r8) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r9) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r10 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r10) [ 297.555804] Invalid option length (1048305) for dns_resolver key 00:58:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f0000000100)=0x10) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 00:58:33 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x6800) [ 297.685851] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.744857] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 297.760470] device lo left promiscuous mode 00:58:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(0x0, r6, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) [ 297.798520] device lo entered promiscuous mode 00:58:33 executing program 2: 00:58:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="37fb1c585d2ff74be8d00100403f7ae058f69450c920f573b81bb2"], 0x1b) 00:58:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000080)) 00:58:34 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x06\x00', 0x101}) 00:58:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00\x00\x00\x00\xb0V\xd3S\xb0\x1d\xf3\xd0', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) close(r0) 00:58:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="01ab085557d5f3ffffffe7ff8100", 0xe, 0x0, 0x0, 0x0) [ 298.226990] device lo left promiscuous mode [ 298.255919] device lo entered promiscuous mode 00:58:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x40000081, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000002c0)=0x35) fadvise64(r2, 0x0, 0x8000, 0x2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000540)={0x10}) fcntl$getownex(r5, 0x10, &(0x7f0000000740)={0x0, 0x0}) pread64(r5, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x200000, 0x0) kcmp(0x0, r6, 0x2, r2, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f00000009c0)='ceph\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000003c0)='vboxnet0\x00', r7) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000680)={'icmp\x00'}, &(0x7f00000006c0)=0x1e) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x5]) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000600)={0x4, 0x7bf79c7f, 0x8, 0x6, 0x20}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r8) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f0000000100)=0xc) r9 = accept4$alg(r0, 0x0, 0x0, 0x80000) socket$alg(0x26, 0x5, 0x0) close(r9) 00:58:34 executing program 0: pipe(&(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x84) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0x0, 0x802) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 298.277607] can: notifier: receive list not found for dev nr0 00:58:34 executing program 1: 00:58:34 executing program 4: [ 298.441420] ================================================================== [ 298.448917] BUG: KMSAN: uninit-value in batadv_interface_tx+0x905/0x1e40 [ 298.455775] CPU: 1 PID: 12335 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 298.462964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.472325] Call Trace: [ 298.474929] dump_stack+0x173/0x1d0 [ 298.478579] kmsan_report+0x12e/0x2a0 [ 298.482404] __msan_warning+0x82/0xf0 [ 298.486225] batadv_interface_tx+0x905/0x1e40 00:58:34 executing program 4: [ 298.490749] ? batadv_softif_is_valid+0xb0/0xb0 [ 298.495494] dev_hard_start_xmit+0x604/0xc40 [ 298.499945] __dev_queue_xmit+0x2e48/0x3b80 [ 298.504305] dev_queue_xmit+0x4b/0x60 [ 298.508118] ? __netdev_pick_tx+0x1260/0x1260 [ 298.512706] packet_sendmsg+0x79bb/0x9760 [ 298.516901] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 298.522110] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 298.527534] ? compat_packet_setsockopt+0x360/0x360 [ 298.532653] __sys_sendto+0x8c4/0xac0 [ 298.536496] ? kmsan_get_shadow_origin_ptr+0x60/0x440 00:58:34 executing program 1: [ 298.541709] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 298.547172] ? prepare_exit_to_usermode+0x114/0x420 [ 298.552201] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 298.557410] __se_sys_sendto+0x107/0x130 [ 298.561499] __x64_sys_sendto+0x6e/0x90 [ 298.565490] do_syscall_64+0xbc/0xf0 [ 298.569230] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.574426] RIP: 0033:0x457e39 [ 298.577624] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.596541] RSP: 002b:00007ff45ea1bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 298.604264] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457e39 [ 298.611549] RDX: 000000000000000e RSI: 0000000020000100 RDI: 0000000000000003 [ 298.618829] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 298.626532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff45ea1c6d4 [ 298.633812] R13: 00000000004c54f2 R14: 00000000004d9358 R15: 00000000ffffffff 00:58:34 executing program 4: [ 298.641106] [ 298.642731] Uninit was created at: [ 298.646284] kmsan_internal_poison_shadow+0x92/0x150 [ 298.651401] kmsan_kmalloc+0xa6/0x130 [ 298.655212] kmsan_slab_alloc+0xe/0x10 [ 298.659117] __kmalloc_node_track_caller+0xe9e/0xff0 [ 298.664227] __alloc_skb+0x309/0xa20 [ 298.667958] alloc_skb_with_frags+0x1c7/0xac0 [ 298.672473] sock_alloc_send_pskb+0xafd/0x10a0 [ 298.677072] packet_sendmsg+0x6881/0x9760 [ 298.681326] __sys_sendto+0x8c4/0xac0 [ 298.685142] __se_sys_sendto+0x107/0x130 00:58:34 executing program 1: [ 298.689228] __x64_sys_sendto+0x6e/0x90 [ 298.693208] do_syscall_64+0xbc/0xf0 [ 298.696938] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.702124] ================================================================== [ 298.709482] Disabling lock debugging due to kernel taint [ 298.714936] Kernel panic - not syncing: panic_on_warn set ... [ 298.720835] CPU: 1 PID: 12335 Comm: syz-executor.2 Tainted: G B 5.0.0-rc1+ #9 [ 298.729416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.738889] Call Trace: [ 298.741496] dump_stack+0x173/0x1d0 [ 298.745156] panic+0x3d1/0xb01 [ 298.748394] kmsan_report+0x293/0x2a0 [ 298.752220] __msan_warning+0x82/0xf0 [ 298.756040] batadv_interface_tx+0x905/0x1e40 [ 298.760573] ? batadv_softif_is_valid+0xb0/0xb0 [ 298.765254] dev_hard_start_xmit+0x604/0xc40 [ 298.769699] __dev_queue_xmit+0x2e48/0x3b80 [ 298.774066] dev_queue_xmit+0x4b/0x60 [ 298.777885] ? __netdev_pick_tx+0x1260/0x1260 [ 298.782399] packet_sendmsg+0x79bb/0x9760 [ 298.786588] ? kmsan_get_shadow_origin_ptr+0x60/0x440 00:58:34 executing program 4: [ 298.791793] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 298.797746] ? compat_packet_setsockopt+0x360/0x360 [ 298.802769] __sys_sendto+0x8c4/0xac0 [ 298.806601] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 298.811810] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 298.817269] ? prepare_exit_to_usermode+0x114/0x420 [ 298.822301] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 298.827510] __se_sys_sendto+0x107/0x130 [ 298.831598] __x64_sys_sendto+0x6e/0x90 [ 298.835586] do_syscall_64+0xbc/0xf0 [ 298.839316] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.844510] RIP: 0033:0x457e39 [ 298.847713] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.866624] RSP: 002b:00007ff45ea1bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 298.874347] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457e39 [ 298.881630] RDX: 000000000000000e RSI: 0000000020000100 RDI: 0000000000000003 [ 298.888907] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 298.896182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff45ea1c6d4 [ 298.903459] R13: 00000000004c54f2 R14: 00000000004d9358 R15: 00000000ffffffff [ 298.912092] Kernel Offset: disabled [ 298.915721] Rebooting in 86400 seconds..